70-410 Exam - Installing and Configuring Windows Server 2012

certleader.com

P.S. Precise 70-410 preparation labs are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Tx7a0Kv4S8BSp9VK9XVHC-fWKOkcNnJK


New Microsoft 70-410 Exam Dumps Collection (Question 3 - Question 12)

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1.

On Server2, you install a network monitoring application named App1.

You need to capture all of the inbound and outbound traffic to Server1 by using App1. Which two commands should you run from Windows PowerShell? (Each correct answer

presents part of the solution. Choose two.)

A. Get-VM u201cServer2 | Set-VMNetworkAdapter -IovWeight 1

B. Get-VM u201cServer1 | Set-VMNetworkAdapter -Allow/Teaming On

C. Get-VM u201cServer1 | Set-VMNetworkAdapter -PortMirroring Source

D. Get-VM u201cServer2 | Set-VMNetworkAdapter -PortMirroring Destination

E. Get-VM u201cServer1 | Set-VMNetworkAdapter -IovWeight 0

F. Get-VM u201cServer2 | Set-VMNetworkAdapter-AllowTeaming On

Answer: C,D


Q2. Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com.

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com.

What should you do?

A. Change the scope of Group1 to domain local.

B. Modify the Allowed to Authenticate permissions in adatum.com.

C. Enable SID quarantine on the trust between contoso.com and adatum.com.

D. Modify the Allowed to Authenticate permissions in contoso.com.

Answer: D

Explanation:

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access.

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.


Q3. Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1.

What should you do first?

A. Copy the snapshot file

B. Pause VM1

C. Shut down VM1

D. Delete the snapshot

Answer: D

Explanation:

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify.

Caution

Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable.

http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx


Q4. Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Serve 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1.

You need to ensure that users can use Previous Versions to restore the files in Share1. What should you configure on Server1?

A. The Shadow Copies settings

B. A Windows Server Backup schedule

C. A data recovery agent

D. The Recycle Bin properties

Answer: A

Explanation:

:A. Enable and schedule shadow copies for Share1

:B. The backup doesnu2021t give users access until files are restored

:D. No settings for file version


Q5. Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain.

You need to reduce how long it takes until stale records are deleted from the zone. What should you do?

A. From the configuration directory partition of the forest, modify the tombstone lifetime.

B. From the configuration directory partition of the forest, modify the garbage collection interval.

C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval.

D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.

Answer: C

Explanation:

Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance.


Q6. Your companyu2021s security policy states that all of the servers deployed to a branch office must not have the graphical user interface (GUI) installed. In a branch office, a support technician installs a server with a GUI installation of Windows Server 2012 on a new server, and then configures the server as a DHCP server.

You need to ensure that the new server meets the security policy. You want to achieve this goal by using the minimum amount of Administrative effort.

What should you do?

A. Reinstall Windows Server 2012 on the server.

B. From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.

C. From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE.

D. From Server Manager, uninstall the User Interfaces and Infrastructure feature.

Answer: D


Q7. What should you do for server core so it can be managed from another server 2012 R2?

A. 1

B. 2

C. 3

D. 4

E. 5

F. 6

G. 7

H. 8

I. 9

J. 10

K. 11

L. 12

M. 13

N. 14

O. 15

Answer: A

Explanation:

You should join the server to the domain first. You can add workgroup servers to Server Manager on a domain joined server, however, you must first add the workgroup computer to the Trusted Hosts list using "Set-Item

wsman:\localhost\Client\TrustedHostsWorkgroupServerName -Concatenate -Force"


Q8. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed.

On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users.

You need to ensure that when the users connect to Documents, they only see the files to which they have access.

What should you do?

A. Enable access-based enumeration.

B. Configure Dynamic Access Control.

C. Modify the Share permissions.

D. Modify the NTFS permissions.

Answer: A

Explanation:

Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature allows users of Windows Server 2003-Based file servers to list only the files and folders to which they have access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access. Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they donu2021t have access to it.

Access-Based Enumeration (ABE) can be enabled at the Share properties through Server Manager

References:

Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features, Objective 2.1: Configure file and share access, p. 75- 80.


Q9. You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including

domain controllers, have Windows Server 2012 R2 installed.

You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre Channel SAN feature.

Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature? (Choose all that apply.)

A. It prevents virtual machines from connecting directly to Fibre Channel storage.

B. It allows for virtual machines to connect to Fibre Channel storage directly.

C. It includes support for virtual SANs, live migration, and multipath I/O.

D. It includes support for virtual SANs, and live migration, but not multipath I/O.

Answer: B,C

Explanation:

To gain the full benefits of server virtualization and cloud architectures, virtualized workloads need to connect easily and reliably to existing SANs. For many enterprise organizations, Hyper-V deployments were limited in scale and scope because they lacked the ability to directly connect VMs to Fibre Channel SAN storage from inside a VM. Hyper- V in Windows Server 2012 R2 now provides virtual Fibre Channel Host Bus Adapter (HBA) ports within the guest operating system that runs the virtual machine, connecting virtual machines directly to FibreChannel SAN Logical Unit Numbers (LUNs).

Virtual Fibre Channel for Hyper-V provides several important advantages for Hyper-V environments:

Simplifies storage connectivity for virtualized workloads to ultra-reliable, high-performance Fibre Channel SAN storage.

Enables new solutions that require shared storage, such as failover clustering, live migration, andmultipath I/O.

Leverages and protects existing investments in Fibre Channel storage? Enables advanced FC SAN storage functionality for VMs.

Facilitates migration of FC workloads into the cloud.

Enables improved monitoring and troubleshooting, with visibility from the VM to the FC SAN storage.

Enables centralized management of Ethernet and FC-based virtualized workloads. Combining Virtual Fibre Channel for Hyper-V and the Brocade Fibre Channel SAN infrastructure greatly simplifies connectivity between Fibre Channel SAN storage and virtualized applications, enabling enterprise IT and hosting providers to achieve new levels of availability, reliability, and scalability for cloud-based services.

You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows Server 2012 R2 provides Fibre Channel ports within the guest operating

system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure.

With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads.

Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.


Q10. You have a network printer connected to print server. You need to be able to print if print server goes down.

What should you configure?

A. branch office direct printing

B. printer pooling

C. spooling

D. Print forwarding

Answer: A

Explanation:

Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print.

Branch Office Direct Printing requires the following operating systems: Windows Server 2012

Windows 8


100% Most recent Microsoft 70-410 Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/70-410/ (New 496 Q&As)