AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For Microsoft- 70-410





Question ID 9133

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2.

You have a written security policy that states the following:

Only required ports must be open on the servers.

All of the servers must have Windows Firewall enabled.

Client computers used by administrators must be allowed to access all of the ports on all of the servers.

Client computers used by the administrators must be authenticated before the client computers can access the servers.

You have a client computer named Computer1 that runs Windows 8.

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

Option A

On Computer1, create a connection security rule.

Option B

On all of the servers, create an outbound rule and select the Allow the connection if it is secure option.

Option C

On all of the servers, create an inbound rule and select the Allow the connection if it is secure option.

Option D

On Computer1, create an inbound rule and select the Allow the connection if it is secure option.

Option E

On Computer1, create an outbound rule and select the Allow the connection if it is secure option.

Option F

On all of the servers, create a connection security rule.

Correct Answer ACF
Explanation Explanation/Reference: Unlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy. Traffic that matches a firewall rule that uses the Allow connection if it is secure setting bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. This method is supported on Windows Vista or Windows Server 2008. References: http://technet.microsoft.com/en-us/library/cc772017.aspx http://technet.microsoft.com/en-us/library/cc753463.aspx


Question ID 9134

Your network contains an Active Directory domain named contoso.com.

You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings. You need to create a new starter GPO based on the settings in GPO1.

You must achieve this goal by using the minimum amount of administrative effort. What should you do?

Option A

Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.

Option B

Create a new starter GPO and manually configure the policy settings of the starter GPO.

Option C

Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the new GPO, and then click Restore from Backup.

Option D

Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste.

Correct Answer B
Explanation Explanation/Reference: Although GPOs and Starter GPOs can both be copied, and a Starter GPO can be used to create a new GPO (as that is their purpose), an existing GPO cannot be copied to a new Starter GPO (unfortunately).

Send email to admin@getfreedumps for new dumps request!!!