P.S. Breathing 70-410 bible are available on Google Drive, GET MORE: https://drive.google.com/open?id=1mVqUlTKr4Zx1buWZOoc2gsS2cxrB6UuY
Question No: 7
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.
VM3 is used to test applications.
You need to prevent VM3 from synchronizing its clock to Server1. What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O visualization
Answer: : I
Explanation:
Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services.
References:
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual- machines.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144
Question No: 8
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots.
You need to modify the snapshot file location of VM1. What should you do?
A. Right-click VM1, and then click Export.
B. Shut down VM1, and then modify the settings of VM1.
C. Delete the existing snapshots, and then modify the settings of VM1.
D. Pause VM1, and then modify the settings of VM1.
Answer: C
Question No: 9
Your network contains a production Active Directory forest named contoso.com and a test Active Directory forest named contoso.test. A trust relationship does not exist between the forests.
In the contoso.test domain, you create a backup of a Group Policy object (GPO) named GPO1.
You transfer the backup of GPO1 to a domain controller in the contoso.com domain. You need to create a GPO in contoso.com based on the settings of GPO1.You must
achieve this goal by using the minimum amount of Administrative effort.
What should you do?
A. From Windows PowerShell, run the Get- GPO cmdlet and the Copy- GPO cmdlet.
B. From Windows PowerShell, run the New- GPO cmdlet and the Import- GPO cmdlet.
C. From Group Policy Management, create a new starter GPO. Right-click the new starter GPO, and then click Restore from Backup.
D. From Group Policy Management, right-click the Croup Policy Objects container, and then click Manage Backups.
Answer: B
Explanation:
:A. Copy-GPO requires domain trust / copy from one domain to another domain within the same forest.
:B. The Import-GPO cmdlet imports the settings from a GPO backup into a specified target GPO. The target GPO can be in a different domain or forest than that from which the backup was made and it does not have to exist prior to the operation.
:C. This would create a starter GPO, not a GPO.
:D: You can also restore GPOs. This operation takes a backed-up GPO and restores it to the same domain from rom the GPOu2021s original which it was backed up. You cannot restore a GPO from backup into a domain different f domain.
The New-GPO cmdlet creates a new GPO with a specified name. By default, the newly created GPO is not linked to a site, domain, or organizational unit (OU). The Import-GPO cmdlet imports the settings from a GPO backup into a specified target GPO. The target GPO can be in a different domain or forest than that from which the backup was made and it does not have to exist prior to the operation.
The Restore-GPO cmdlet restores a GPO backup to the original domain from which it was saved. If the original domain is not available, or if the GPO no longer exists in the domain, the cmdlet fails.
Since the GPOu2021s original domain is different and there is no trust relationship between forests, you should execute the New-GPO command and import the already existing command into the u2021newu2021 domain.
Question No: 10
Your network contains an Active Directory domain named contoso.com.
The password policy for the domain is set to require a minimum password length of 10 characters.
A user named User1 and a user named User2 work for the sales department.
User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters.
You need to identify what forces the two users to have different password lengths. Which tool should you use?
A. Credential Manager
B. Security Configuration Wizard (SCW)
C. Group Policy Management
D. Active Directory Administrative Center
Answer: D
Explanation:
In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources.
This is found in the Active Directory Administrative Center. You can use Active Directory Administrative Center to perform the following Active Directory administrative tasks: Create new user accounts or manage existing user accounts
Create new groups or manage existing groups
Create new computer accounts or manage existing computer accounts
Create new organizational units (OUs) and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers
Filter Active Directory data by using query-building search
Reference: http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx
Question No: 11
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.
You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script.
You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script?
A. .bat
B. .cmd
C. .ps1
D. .xml
Answer: C
Explanation:
PowerShell scripts are saved with the extension ".ps1".
From http://technet.microsoft.com/en-us/library/jj574105.aspx
The Review Options page in Server Manager also offers an optional View Script button to create a Unicode text file that contains the current ADDS Deployment configuration as a single Windows PowerShell script. This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard. This process creates a valid and syntactically correct sample for further modification or direct use.
Question No: 12
Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.
What should you do?
A. Run the Delegation of Control Wizard on OU1.
B. Add User1 to the Group Policy Creator Owners group.
C. Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder.
D. Modify the permissions on the User1 account.
Answer: A
Explanation:
The Delegation of Control Wizard allows you to delegate tasks, active Directory Object types and to set permissions.
Question No: 13
You have a server named Server1 that runs Windows Server 2012 R2.
You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly.
You need to ensure that the feature can be installed on Server1. What should you do?
A. Install Windows Identity Foundation (WIF) 3.5.
B. Install the Web Server (IIS) server role.
C. Connect Server1 to the Internet.
D. Run the Add-AppxProvisionedPackage cmdlet.
Answer: C
Explanation:
The files needed are no longer available on the local Hard drive. We need to connect the server to the Internet.
Important to note that when starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by default. The files have been
removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By default, if feature files are not available on the destination server that is running Windows Server 2012 R2 Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.
Question No: 14
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1. What should you do first?
A. Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet.
B. Add a second legacy network adapter, and then run the Set-VMNetworkAdopter cmdlet.
C. Add a second legacy network adapter, and then configure network adapter teaming.
D. Remove the legacy network adapter, and then add a network adapter.
Answer: D
Explanation:
:A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the management operating system
:B. The legacy network adapter doesnu2021t support bandwidth management
:C. The legacy network adapter doesnu2021t support bandwidth management
:D. Add a New network adapter. The legacy network adapter doesnu2021t support bandwidth management.
Question No: 15
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine. What should you do?
A. Convert Disk 1 to a GPT disk.
B. Delete partition E.
C. Convert Disk 1 to a dynamic disk.
D. Take Disk 1 offline.
Answer: D
Explanation:
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 159
Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers, Chapter 1: p. 42-43 http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in- hyper-v.aspx
Question No: 16
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?
A. Run the Disable NetFirewallRule cmdlet.
B. Install Remote Server Administration Tools (RSAT).
C. Install Windows Management Framework.
D. Run the Enable-Com + Network Access Firewall Rule.
Answer: D
Explanation:
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the NetFirewallRule command. This will allow you to view the event logs.
Recommend!! Get the Breathing 70-410 dumps in VCE and PDF From Allfreedumps, Welcome to download: https://www.allfreedumps.com/70-410-dumps.html (New 479 Q&As Version)