[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 281-290

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 281 HOTSPOT – (Topic 3)

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server2 has the Windows Deployment Services server role installed.

On Server1, you have a virtual machine named VM1.

You plan to deploy an image to VM1 by using Windows Deployment Services (WDS). You need to ensure that VM1 can connect to Server1 by using PXE.

Which settings should you configure on VM1? To answer, select the appropriate settings in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Virtual machines can be deployed to Hyper-V using Windows Deployment Services (WDS). To accomplish this requires the proper WDS infrastructure be in place and that the VM PXE boot using a Legacy Network Adapter.

By default, there is only a “Standard Network Adapter” installed on the Virtual Machine, but for PXE functionality you will need to add a “Legacy Network Adapter”.

Go to the “Legacy Network Adapter” that you just added and specify that it should use the Virtual Switch that you just created.

Last but not least, you should change the BIOS boot priority to make sure that the Virtual Machine always tries to boot first using the “Legacy Network Adapter”. Just select the “Legacy Network Adapter” and move it to the top using the buttons.

Start your Virtual Machine and now PXE boot should work.

The Pre-Boot Execution Environment (PXE) provider for Windows Deployment Services provides client boot services over the network. It registers itself with the WDS Server service (the main server-side service of the Windows Deployment Services solution) and

requests a remote procedure call (RPC) endpoint.

After the Windows Deployment Services server role is installed, you must configure the server by using either the Windows Deployment Services MMC snap-in or the /Initialize- Server command-line option. The PXE provider must be configured properly before it can provide client boot services over the network.

References:

http://technet.microsoft.com/en-us/library/cc726550(v=WS.10).aspx

Question No: 282 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You need to ensure that the local Administrator account on all computers is renamed to L_Admin. Which Group Policy settings should you modify?

  1. Security Options

  2. User Rights Assignment

  3. Restricted Groups

  4. Preferences

Answer: A

Question No: 283 – (Topic 3)

Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers.

The domain controllers are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain.

You log on to DC3.

You need to identify which service location (SRV) records are registered by DC3. What should you do?

  1. Open the %windir%\system32\config\netlogon.dns file.

  2. Run dcdiag /test:dns

  3. Open the %windir%\system32\dns\backup\adatum.com.dns file.

  4. Run ipconfig /displaydns.

Answer: A Explanation:

  1. Netlogon service creates a log file that contains all the locator resource records and places the logfile in the following location:

  2. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help introubleshooting.

  3. dns backup file

  4. used to display current resolver cache content You can verify SRV locator resource records by viewing netlogon.dns, located in the %systemroot%\System32\Config folder. The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that host specific services.

SRV resource records are used to locate domain controllers for Active Directory. You can use Notepad, to view this file.

The first record in the file is the domain controller’s Lightweight Directory Access Protocol (LDAP) SRV record.

This record should appear similar to the following: _ldap._tcp.Domain_Name

Question No: 284 – (Topic 3)

Your network contains two subnets. The subnets are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1.

You run the route print command as shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to ensure that Server1 can communicate with the client computers on LAN2. What should you do?

  1. Change the default gateway address.

  2. Set the state of the Microsoft ISATAP Adapter #2 interface to disable.

  3. Change the metric of the 10.10.1.0 route.

  4. Set the state of the Teredo interface to disable.

Answer: A Explanation:

The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2.

In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such “last” addresses of a subnet are considered “broadcast” addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so it’s not a very common practice.

Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256

Question No: 285 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2.

You have a client application named App1 that communicates to Server1 by using dynamic TCP ports.

On Server1, a technician runs the following command:

New-NetFirewallRule -DisplayNameAllowDynamic -Direction Outbound -LocalPort 1024- 65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using Appl.

You need to ensure that App1 can connect to Server1. What should you run on Server1?

  1. Set-NetFirewallRule -DisplayNameAllowDynamic -Action Allow

  2. netshadvfirewall firewall add rule name=allowdynamic action-allow

  3. netshadvfirewall firewall set rule name-allowdynamic new action- allow

  4. Set-NetFirewallRule -DisplayNameAllowDynamic -Direction Inbound

Answer: D Explanation:

When using the using the Windows Firewall with Advanced Security console. You can select the Inbound Rules node and scroll down in the list, you can see nine different Network Discovery rules. The Direction Inbound rule is the rule that will allow App1 to connect to Server1.

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create and manage Group Policy, Objective 6.4: Configure Windows Firewall, p. 348

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269

Question No: 286 – (Topic 3)

You have two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. The servers are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to ensure that you can successfully ping Server2 from Server1.

What should you do on Server1?

  1. Disable Windows Firewall.

  2. Modify the subnet mask.

  3. Modify the DNS settings.

  4. Modify the default gateway settings.

Answer: D Explanation:

Route is used to view and modify the IP routing table.

Route Print displays a list of current routes that the host knows. Default gateways are important to make IP routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger inter network. In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing table to see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IP traffic for Host B to its own default gateway, IP Router 1.

The Default Gateway specifies the IP address of a router on the local subnet, which the system will use to access destinations on other networks. If the default gateway settings are not properly configured, then there can be no successful connection.

Reference:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269

Question No: 287 – (Topic 3)

Your network contains an Active Directory domain named adatum.com. The domain contains the servers shown in the following table.

Ensurepass 2017 PDF and VCE

You need to ensure that you can use Server Manager on DC1 to manage DC2.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Install Microsoft .NET Framework 4 on DC2.

  2. Install Remote Server Administration Tools on DC1.

  3. Install the Windows PowerShell 2.0 engine on DC1.

  4. Install Remote Server Administration Tools on DC2.

  5. Install Windows Management Framework 3.0 on DC2.

Answer: A,E Explanation:

In Windows Server 2012 R2, you can use Server Manager to perform management tasks on remote servers. Remote management is enabled by default on servers that are running Windows Server 2012 R2. To manage a server remotely by using Server Manager, you add the server to the Server Manager server pool.

You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2, but the following updates are required to fully manage these older operating systems.

Windows Management Framework 3.0. To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NET Framework 4.0, and then install Windows Management Framework 3.0 on those servers.

Reference:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80

Question No: 288 HOTSPOT – (Topic 3)

Your network contains an Active Directory domain named contoso.com.

Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012 R2.

The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1.

Which settings should you configure?

To answer, select the appropriate settings in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

WDS Allows network-based installation of Windows operating systems, which reduces the complexity and cost when compared to manual installations. Thus you should configure the appropriate network settings.

Question No: 289 – (Topic 3)

Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home contains the home folder of each user.

All users have the necessary permissions to access only their home folder.

A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit

button.)

Ensurepass 2017 PDF and VCE

You need to ensure that all users see only their own home folder when they access Home. What should you do from Server2?

  1. From Windows Explorer, modify the properties of Home.

  2. From Server Manager, modify the properties of the volume that contains Home.

  3. From Windows Explorer, modify the properties of the volume that contains Home.

  4. From Server Manager, modify the properties of Home.

    Answer: D Explanation:

    Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature based file servers to list only the files and folders to which they have allows users of Windows Server 2003 access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access.

    Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they don’t have access to it.

    Question No: 290 HOTSPOT – (Topic 3)

    Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.

    An administrator creates an application control policy and links the policy to an organizational unit (OU) named OU1. The application control policy contains several deny rules. The deny rules apply to the Everyone group.

    You need to prevent users from running the denied application. What should you configure?

    To answer, select the appropriate object in the answer area.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    To enable the Enforce rules enforcement setting by using the Local Security Policy snap-in

    1. Click Start, type secpol.msc in the Search programs and files box, and then press ENTER.

    2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.

    3. In the console tree, double-click Application Control Policies, right-click AppLocker, and then click Properties.

    4. On the Enforcement tab, select the Configured check box for the rule collection that you want to enforce, and then verify that Enforce rules is selected in the list for that rule collection.

    5. Repeat step 4 to configure the enforcement setting to Enforce rules for additional rule collections.

    6. Click OK.

You should apply an application control policy for executable rules. When AppLocker policies from various GPOs are merged, both the rules and the enforcement modes are merged. The most similar Group Policy setting is used for the enforcement mode, and all rules from linked GPOs are applied.

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create and Manage Group Policy, Objective 6.2: Local Users and Groups, p. 329. http://technet.microsoft.com/en-us/library/dd759115.aspx

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 271-280

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 271 – (Topic 3)

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1.

You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is enabled.

Share1 contains an application named Appl.exe.

You configure the NTFS permissions on Folder1 as shown in the following table.

Ensurepass 2017 PDF and VCE

The members of Group2 report that they cannot make changes to the files in Share1. The members of Group1 and Group2 run Appl.exe successfully.

You need to ensure that the members of Group2 can edit the files in Share1. What should you do?

  1. Replace the NTFS permissions on all of the child objects.

  2. Edit the Share permissions.

  3. Edit the NTFS permissions.

  4. Disable access-based enumeration.

Answer: C Explanation:

Share permissions and NTFS permissions are independent in the sense that neither changes the other. The final access permissions on a shared folder are determined by taking into consideration both the share permission and the NTFS permission entries. The more restrictive permissions are then applied.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter8: File Services and Storage, Lesson 2: Provisioning and Managing Shared Storage, p.388

Question No: 272 – (Topic 3)

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual machines that run Windows Server 2012 R2.

Your company uses smart cards for authentication.

You need to ensure that you can use smart card authentication when you connect to the virtual machine by using Virtual Machine Connection.

What should you configure?

  1. The RemoteFX settings

  2. The Enhanced Session Mode Policy

  3. The NUMA Spanning settings

  4. The Integration Services settings

Answer: B

Question No: 273 – (Topic 3)

You have a virtual machine named VM1.

You install Windows Server 2012 R2 on VM1.

You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed.

You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files.

Which tool should you use?

  1. servermanagercmd.exe

  2. dism.exe

  3. ocsetup.exe

  4. imagex.exe

Answer: B Explanation:

You can use DISM to:

Add, remove, and enumerate packages and drivers. Enable or disable Windows features.

Apply changes based on the offline servicing section of an unattend.xml answer file. Configure international settings.

Upgrade a Windows image to a different edition. Prepare a Windows PE image.

Take advantage of better logging.

Service down-level operating systems like Windows Vista with SP1 and Windows Server 2008.

Service all platforms (32-bit, 64-bit, and Itanium).

Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. Make use of old Package Manager scripts.

This command will mount the image before making any changes. This will ensure that only the required Windows Server 2012 R2 source files are contained.

Question No: 274 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.

You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.

What should you do?

  1. Run the Delegation of Control Wizard on the Policies containers

  2. Run the Set-GPPermission cmdlet

  3. Run the Delegation of Control Wizard on OU1

  4. Modify the permission on the user1 account

Answer: C Explanation: Explanation

  1. Not minimum permissions

  2. Grants a level of permissions to a security principal for one GPO or all the GPOs in a domain

  3. Minimizes delegated permission to a single OU

  4. Will not allow GPO changes to the OU Delegation of Control Wizard

The following are common tasks that you can select to delegate control of them: Create, delete, and manage user accounts

Reset user passwords and force password change at next logon Read all user information Modify the membership of a group

Join a computer to a domain Manage Group Policy links

Generate Resultant Set of Policy (Planning) Generate Resultant Set of Policy (Logging)

Create, delete, and manage inetOrgPerson accounts

Reset inetOrgPerson passwords and force password change at next logon Read all inetOrgPerson information

Question No: 275 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. You promote

Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1?

  1. Open the Srv.sys file

  2. Open the Netlogon.dns file

  3. Run ipconfig/displaydns

  4. Run Get-DnsServerDiagnostics

Answer: B

Question No: 276 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

On Server1, an administrator creates a virtual machine named VM1.

A user named User1 is the member of the local Administrators group on Server1.

User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm cmdlet.

What should you instruct User1 to do?

  1. Import the Hyper-V module.

  2. Install the Integration Services on VM1.

  3. Run Windows PowerShell with elevated privileges.

  4. Modify the membership of the local Hyper-V Administrators group.

Answer: C

Explanation:

You can only use the PowerShell snap-in to modify the VM settings with the vm cmdlets when you are an Administrator.

Thus best practices dictate that User1 run the PowerShell with elevated privileges. Reference: http://technet.microsoft.com/en-us/library/jj713439.aspx

Question No: 277 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

An iSCSI SAN is available on the network.

Server1 hosts four virtual machines named VM1, VM2, VM3, VM4. You create a LUN on the SAN.

You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN.

What should you configure?

  1. A fixed-size VHDX

  2. A dynamically expanding VHDX

  3. A fixed-size VHD

  4. A pass-through disk

  5. A dynamically expanding VHD

Answer: D Explanation:

You can use physical disks that are directly attached to a virtual machine as a storage option on the management operating system. This allows virtual machines to access storage that is mapped directly to the server running Hyper-V without first configuring the

volume. The storage can be either a physical disk which is internal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logical reference to a portion of a storage subsystem). The virtual machine must have exclusive access to the storage, so the storage must be set in an Offline state in Disk Management. The storage is not limited in size, so it can be a multi-terabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following:

This type of disk cannot be dynamically expanded. You cannot use differencing disks with them.

You cannot take virtual hard disk snapshots. Att:

If you are installing an operating system on the physical disk and it is in an Online state before the virtual machine is started, the virtual machine will fail to start. You must store the virtual machine configuration file in an alternate location because the physical disk is used by the operating system installation. For example, locate the configuration file on another internal drive on the server running Hyper-V.

Question No: 278 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. You plan to create an image of Server1.

You need to remove the source files for all server roles that are not installed on Server1. Which tool should you use?

  1. servermanagercmd.exe

  2. imagex.exe

  3. ocsetup.exe

  4. dism.exe

Answer: D Explanation:

servermanagercmd.exe – The ServerManagerCmd.exe command-line tool has been deprecated in

Windows Server 2008 R2. imagex.exe – ImageX is a command-line tool in Windows Vista that you can use to create and manage Windows image (.wim) files. A .wim file contains one or more volume images, disk volumes that contain images of an installed Windows operating system. dism.exe – Deployment Image Servicing and Management (DISM.exe) is a command-line tool that can be used to service a Windows image or to prepare a Windows Preinstallation Environment (Windows PE) image. It replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg that were included in Windows Vista.

The functionality that was included in these tools is now consolidated in one tool (DISM.exe), and new functionality has been added to improve the experience for offline servicing. DISM can Add, remove, and enumerate packages. ocsetup.exe – The Ocsetup.exe tool is used as a wrapper for Package Manager (Pkgmgr.exe) and for Windows Installer (Msiexec.exe). Ocsetup.exe is a command-line utility that can be used to perform scripted installs and scripted uninstalls of Windows optional components. The Ocsetup.exe tool replaces the Sysocmgr.exe tool that Windows XP and Windows Server 2003i use.

The Dism utility can be used to create and mount an image of Server1. References:

http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 2: Deploying Servers, p. 44

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 1: Installing and Configuring Servers, p. 19-22

Question No: 279 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. You plan to enable Hyper-V Network Virtualization on Server1.

You need to install the Windows Network Visualization Filter Driver on Server1. Which Windows PowerShell cmdlet should you run?

  1. Set-NetVirtualizationGlobal

  2. Enable-NetAdapterBinding

  3. Add – WindowsFeature

  4. Set-NetAdapterVmq

Answer: B Explanation:

Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each virtual network operates as if it is running as a physical network. The Set- NetAdaptercmdlet sets the basic properties of a network adapter such as virtual LAN (VLAN) identifier (ID) and MAC address. Thus if you add the binding parameter to the command then you will be able to install the Windows Network Virtualization Filter Driver. Step one:

Enable Windows Network Virtualization (WNV). This is a binding that is applied to the NIC that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO NIC team. Either way, it is the network adapter that your External Virtual Switch uses to exit the server.

This also means that if you have multiple virtual networks or multiple interfaces that you can pick and choose and it is not some global setting.

If you have one External Virtual Switch this is fairly easy:

$vSwitch = Get-VMSwitch -SwitchType External

# Check if Network Virtualization is bound

# This could be done by checking for the binding and seeing if it is enabled ForEach-Object -InputObject $vSwitch {

if ((Get-NetAdapterBinding -ComponentID quot;ms_netwnvquot; -InterfaceDescription

$_.NetAdapterInterfaceDescription).Enabled -eq $false){

# Lets enable it

Enable-NetAdapterBinding -InterfaceDescription $_.NetAdapterInterfaceDescription – ComponentID quot;ms_netwnvquot;

}

}

Question No: 280 – (Topic 3)

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed.

You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode.

Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)

  1. It allows for swifter access to cached files and redirected folders.

  2. To enable Always Offline Mode, you have to satisfy the forest and domain functional- level requirements, as well as schema requirements

  3. It allows for lower bandwidth usage due to users are always working offline.

  4. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2.

Answer: A,C Explanation:

There are no domain/forest/schema requirements, but clients must be running Windows 8/Windows Server 2012 or later.

Offline Files have four modes of operation: Online

Slow link Auto offline Manual offline

Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection by manually switching to manual offline mode.

To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode.

Reads, Writes and Synchronization

In online mode, changes to files are made on the file server as well as in the local cache (this induces a performance hit – see this article for details). Reads are satisfied from the local cache (if in sync).

In slow link mode, changes to files are made in the local cache. The local cache is background-synchronized with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local cache. No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 261-270

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 261 – (Topic 3)

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1.

What should you do first?

  1. Copy the snapshot file

  2. Pause VM1

  3. Shut down VM1

  4. Delete the snapshot

Answer: D Explanation:

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify.

Caution

Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable.

http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx

Question No: 262 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

You need to configure storage for a virtual machine to meet the following requirements:

->Support up to 3 TB of data on a single hard disk.

->Allocate disk space as needed.

->Use a portable storage format.

What should you configure?

  1. A fixed-size VHDX

  2. A pass-through disk

  3. A fixed-size VHD

  4. A dynamically expanding VHDX

  5. A dynamically expanding VHD

Answer: D Explanation:

Support for virtual hard disk storage capacity of up to 64 TB. vhd max is 2TB

Dynamically expanding virtual hard disk uses only as much physical storage space as it needs to store the actual data that the disk currently contains. The size of the virtual disk’s image file then grows as additional data is written to it.

References:

http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 157-158

70-410: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7: Hyper-V virtualization, Lesson 2: Deploying and Configuring virtual machines, p. 320

Question No: 263 DRAG DROP – (Topic 3)

Your company has a main office that contains 225 client computers. The client computers are located on a subnet that uses the network ID of 10.10.1.0/24.

The company plans to open two branch offices. The offices will be configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You need to select a network prefix for each office to ensure that there are enough IPv4 addresses for each client computer.

The solution must minimize the number of unused IP addresses. Which network prefixes should you select?

To answer, drag the appropriate network prefix to the correct branch office in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 264 DRAG DROP – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that has the DNS Server server role installed. DC1 hosts an Active Directory-integrated zone for the domain. The domain contains a member server named Server1.

You install the DNS Server server role on Server1.

You need to ensure that Server1 can respond authoritatively to queries for the existing contoso.com namespace.

Which cmdlets should you run on each server? (To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

The Set-DnsServerPrimaryZonecmdlet changes settings for an existing Domain Name System (DNS) primary zone. You can change values that are relevant for either Active Directory-integrated zones or file-backed zones. This cmdlet should be run on Server1 to make it authoritative. The Add-DnsServerSecondaryZonecmdlet adds a specified secondary zone on a Domain Name System (DNS) server. You can create either a forward lookup zone or a reverse lookup zone. This cmdlet should be run on DC1.

Question No: 265 HOTSPOT – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets.

You add three new printers to the MainOffice subnet. The printers have static IP addresses. The IP addresses are consecutive.

You need to create an exclusion range that contains the IP addresses of the printers.

From which node should you configure the exclusion range? To answer, select the appropriate node in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 266 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2.

An administrator creates a security template named Template1. You need to apply Template1 to Server1.

Which snap-in should you use?

  1. Resultant Set of Policy

  2. Security Configuration and Analysis

  3. Authorization Manager

  4. Security Templates

Answer: B Explanation:

The Security Configuration and Analysis tool contains the Local Security Policy snap-in that is used to apply templates.

References:

http://technet.microsoft.com/en-us/library/bb742512.aspx http://technet.microsoft.com/en-us/library/cc739442(v=WS.10).aspx

Question No: 267 – (Topic 3)

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5.

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.

Which domain controller should you identify?

  1. DC1

  2. DC2

  3. DC3

  4. DC4

Answer: C

Question No: 268 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.

On Server1, you create a share named Documents.

You need to ensure that users can recover files that they accidently delete from Documents.

What should you do?

  1. Enable shadow copies by using Computer Management.

  2. Create a storage pool that contains a two-way mirrored volume by using Server Manager.

  3. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.

  4. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).

    Answer: A Explanation:

    If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis-that is, you cannot select specific shared folders and files on a volume to be copied or not copied.

    To enable and configure Shadow Copies of Shared Folders:

    1. Click Start, point to Administrative Tools, and then click Computer Management.

    2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies.

    3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable.

    4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings.

    5. To make changes to the default schedule and storage area, click Settings.

      Shadow copies – a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten.

      References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302

      Question No: 269 – (Topic 3)

      You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the Hyper-V server role installed.

      The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.)

      Ensurepass 2017 PDF and VCE

      You create a virtual machine on Server2 named VM1.

      You need to ensure that you can configure a pass-through disk for VM1. What should you do?

      1. Convert Disk 1 to a basic disk.

      2. Take Disk 1 offline.

      3. Create a partition on Disk 1.

      4. Convert Disk 1 to a MBR disk.

Answer: B Explanation:

Pass-through Disk Configuration

Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective

Question No: 270 DRAG DROP – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.

On Server1, you create a share named Documents. The Share permission for the Documents share is configured as shown in the following table.

Ensurepass 2017 PDF and VCE

The NTFS permission for the Documents share is configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You need to configure the Share and NTFS permissions for the Documents share. The permissions must meet the following requirements:

->Ensure that the members of a group named Group1 can read files and run programs in Documents.

->Ensure that the members of Group1 can modify the permissions on only their own

files in Documents.

->Ensure that the members of Group1 can create folders and files in Documents.

->Minimize the number of permissions assigned to users and groups.

How should you configure the permissions?

To answer, drag the appropriate permission to the correct location. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Granting a user Full Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is restricted in some other way. Be cautious in granting Full Control.

If you want to manage folder access by using NTFS permissions exclusively, set share permissions to Full Control for the Everyone group.

NTFS permissions affect access both locally and remotely. NTFS permissions apply regardless of protocol. Share permissions, by contrast, apply only to network shares. Share permissions do not restrict access to any local user, or to any terminal server user, of the computer on which you have set share permissions. Thus, share permissions do not provide privacy between users on a computer used by several users, nor on a terminal server accessed by several users.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 251-260

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 251 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1.

A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1.

In the Users container, you create a new user named User2.

You need to ensure that the same applications are published to User2. What should you do?

  1. Modify the settings in GPO1.

  2. Move User2 to OU1

  3. Link a WMI filter to GPO1.

  4. Modify the security of GPO1.

Answer: B Explanation:

Moving User2 to OU1 will give him the same access as User1.

The GPO is linked to OU1. By moving User2 to OU1 the GPO will be applied to this user.

Question No: 252 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers.

The domain controllers are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2. Server1 is in a workgroup.

You need to perform an offline domain join of Server1 to the contoso.com domain. What should you do first?

  1. Transfer the PDC emulator role to Dc1.

  2. Run the djoin.exe command.

  3. Run the dsadd.exe command.

  4. Transfer the infrastructure master role to DC1.

Answer: B Explanation:

  1. Creates a new Active Directory computer.

  2. Use djoin for offline join in the perimeter network

  3. Adds specific types of objects to the directory.

  4. Add the local computer to a domain or workgroup.

Question No: 253 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

You have a virtual machine named VM1. VM1 has a checkpoint. You need to modify the Checkpoint File Location of VM1.

What should you do first?

  1. Copy the checkpoint file.

  2. Delete the checkpoint.

  3. Shut down VM1.

  4. Pause VM1.

Answer: B

Question No: 254 – (Topic 3)

You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone.

You discover that the root hints were removed from Server1. You need to view the default root hints of Server1.

Which file should you open?

  1. Netlogon.dns

  2. Cache.dns

  3. Globalnames.dns

  4. Place.dns

Answer: B Explanation:

DNS Server service implements root hints using a file, Cache.dns, stored in the systemroot\System32\Dns folder on the server. Thus viewing the Cache.dns file will show the root hints.

Question No: 255 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain

contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

You create an external virtual switch named Switch1. Switch1 has the following configurations:

->Connection type: External network

->Single-root I/O virtualization (SR-IOV): Enabled

->Ten virtual machines connect to Switch1.

You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines.

What should you do?

  1. Remove Switch1 and recreate Switch1 as an internal network.

  2. Change the Connection type of Switch1 to Private network.

  3. Change the Connection type of Switch1 to Internal network.

  4. Remove Switch1 and recreate Switch1 as a private network.

Answer: D Explanation:

You cannot change the type of vswitch from external to private when SR-IOV is enabled at vswitch creation -gt;you need to recreate the vswitch.

Question No: 256 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.

You need to ensure that VM1 can start by using PXE. What should you do?

  1. Add a second network adapter, and then run the Set-VMNetworkAdaptercmdlet.

  2. Add a second network adapter, and then configure network adapter teaming.

  3. Remove the network adapter, and then run the Set-VMNetworkAdaptercmdlet.

  4. Remove the network adapter, and then add a legacy network adapter.

Answer: D

Question No: 257 – (Topic 3)

You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2.

Server1 has the DHCP Server server role and the File Server server role installed.

You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI).

The solution must meet the following requirements:

->Preserve the server roles and their configurations.

->Minimize administrative effort.

What should you do?

  1. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server with a GUI.

  2. Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation.

    When the installation is complete, add the Server Graphical Shell feature.

  3. Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI.

  4. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server Core Installation.

When the installation is complete, add the Server Graphical Shell feature

Answer: D Explanation:

  1. Server is on 2008 R2 core, must install 2012 R2 core and then GUI

  2. Not least effort

  3. Not least effort

  4. Upgrade to 2012 R2 and install GUI shell

http://technet.microsoft.com/en-us/library/jj574204.aspx Upgrades that switch from a

Server Core installation to the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported.

However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server Core and Server with a GUI modes.

Question No: 258 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed.

On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users.

You need to ensure that when the users connect to Documents, they only see the files to which they have access.

What should you do?

  1. Enable access-based enumeration.

  2. Configure Dynamic Access Control.

  3. Modify the Share permissions.

  4. Modify the NTFS permissions.

Answer: A Explanation:

Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature allows users of Windows Server 2003-Based file servers to list only the files and folders to which they have access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access. Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they don’t have access to it.

Access-Based Enumeration (ABE) can be enabled at the Share properties through Server Manager

References:

Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features, Objective 2.1: Configure file and share access, p. 75- 80.

Question No: 259 HOTSPOT – (Topic 3)

You have a server named Server1. Server1 runs Windows Server 2012 R2. A user named Admin1 is a member of the local Administrators group.

You need to ensure that Admin1 receives a User Account Control (UAC) prompt when attempting to open Windows PowerShell as an administrator.

Which setting should you modify from the Local Group Policy Editor? To answer, select the appropriate setting in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Local Group Policy Editor is a Microsoft Management Console (MMC) snap-in that is used to configure and modify Group Policy settings within Group Policy Objects (GPOs).

Administrators need to be able to quickly modify Group Policy settings for multiple users and computers throughout a network environment. The Local Group Policy Editor provides administrators with a hierarchical tree structure for configuring Group Policy settings in GPOs. These GPOs can then be linked to sites, domains, and organizational units (OU) that contain computer or user objects.To work efficiently, administrators need to have immediate access to information about the function and purpose of individual policy settings. For Administrative Templates policy settings, Local Group Policy Editor provides information about each policy setting directly in the web view of the console. This information shows operating system requirements, defines the policy setting, and includes any specific details about the effect of enabling or disabling the policy setting.

Question No: 260 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.

You install the Windows PowerShell Web Access gateway on Server1.

You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway.

Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.)

  1. Set-WSManQuickConfig

  2. Set-WSManInstance

  3. Add-PswaAuthorizationRule

  4. Set-BCAuthentication

  5. Install-PswaWebApplication

Answer: C,E Explanation:

  1. Configures the local computer for remote management.

  2. Modifies the management information that is related to a resource.

  3. Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set.

  4. Specifies the BranchCache computer authentication mode.

  5. Configures the Windows PowerShell 庐 Web Access web Application in IIS.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 241-250

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 241 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012 R2.

CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1.

When you attempt to remove Printer1 from CONT2, you receive the error message shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You successfully delete the other printers installed on CONT2.

You need to identify what prevents you from deleting Printer1 on CONT2. What should you identify?

  1. Printer1 is deployed as part of a mandatory profile.

  2. Printer1 is deployed by using a Group Policy object (GPO).

  3. Your user account is not a member of the Print Operators group on CONT2.

  4. Your user account is not a member of the Print Operators group on CONT1.

Answer: B

Question No: 242 HOTSPOT – (Topic 3)

Your network contains a server named Server1 that runs Windows Server 2012 R2. App1 has the Print and Document Services server role installed.

All client computers run Windows 8.

The network contains a network-attached print device named Printer1. From App1, you share Printer1.

You need to ensure that users who have connected to Printer1 previously can print to Printer1 if App1 fails.

What should you configure? To answer, select the appropriate option in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Enabling Branch Office Direct Printing is a new feature in Windows Server 2012 R2 that helps branch-office sites reduce their wide area network (WAN) usage by printing directly to a print device instead of spooling print jobs to a print queue on the print server.

Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print.

Branch Office Direct Printing requires the following operating systems: Windows Server 2012

Windows 8

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 9: Print and Document Services, Lesson 1: Deploying and managing print servers, p. 443 http://technet.microsoft.com/en-us/library/jj134156

http://technet.microsoft.com/en-us/library/jj134152.aspx.

Question No: 243 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Web Server (IIS) server role installed.

Server1 has a web site named Web1. Web1 is configured to use digest authentication. You need to ensure that a user named User1 can access Web1.

What should you do from Active Directory Users and Computers?

  1. From the properties of User1, select Store password using reversible encryption.

  2. From the properties of User1, select Use Kerberos DES encryption types for this account.

  3. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).

  4. From the properties of Server1, assign the Allowed to Authenticate permission to User1.

Answer: A Explanation:

Challenge Handshake Authentication Protocol (CHAP) is a basic level of iSCSI security that is used to authenticate the peer of a connection and is based upon the peers sharing a secret: that secret being a password. To make sure that User1 can connect to the server, you should use Active Directory Users and Computers to store that password.

Question No: 244 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2.

You need to remove Windows Explorer, Windows Internet Explorer, and all related components and files from Server1.

What should you run on Server1?

  1. Uninstall-WindowsFeature Server-Gui-Mgmt-Infra Remove

  2. Uninstall-WindowsFeature Server-Gui-Shell Remove

  3. msiexec.exe /uninstall iexplore.exe /x

  4. msiexec.exe /uninstall explorer.exe /x

Answer: B Explanation:

  1. Would be a server core install

  2. No IE or taskbar, explorer or control panel

  3. Would leave components

  4. Would leave components

In Windows Server 2012 R2, you can remove the Server Graphical Shell, resulting in the “Minimal ServerInterface”.

This is similar to a Server with a GUI installation, but Internet Explorer 10, Windows Explorer, the desktop, and the Start screen are not installed.

Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel are still present.

If the server has a full installation of Windows Server, and I need to bring the server down to minimal server interface, I only need to remove the Server-GUI-Shell.

Question No: 245 DRAG DROP – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2.

You need to create a new volume on File1.

The new volume must have the following configurations:

->Have the drive letter T

->Have the FAT32 file system

->Be stored on a new virtual hard disk

In which order should you run the Diskpart commands?

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Box 1: create vdisk Box 2: attach vdisk Box 3: create partition Box 4: assign

Box 5: format

Note: Example:

createvdisk file=quot;C:\vdisks\disk1.vhdquot; maximum=16000 attachvdisk

create partition primary assign letter=g

format

References:

http://technet.microsoft.com/en-us/library/gg252576.aspx http://technet.microsoft.com/en-us/library/hh831487.aspx

Question No: 246 – (Topic 3)

Your network contains an Active Directory domain named contoso.com.

You have a Group Policy object (GPO) named GPO1 that contains several user settings. GPO1 is linked to an organizational unit (OU) named OU1.

The help desk reports that GPO1 applies to only some of the users in OU1.

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to configure GPO1 to apply to all of the users in OU1. What should you do?

  1. Modify the Security settings of GPO1.

  2. Disable Block Inheritance on OU1.

  3. Modify the GPO status of GPO1.

  4. Enforce GPO1.

Answer: A Explanation:

Inheritance is blocked, but that would only affect policies applied ABOVE the given OU, not the one applied directly to it (as is the case with GPO1). Also Enforcing a policy is only going to cause it to be applied even when inheritance is blocked (which, as mentioned, does not make a difference on policies which are directly linked to the OU as a child). That means that there must be something in the security settings (such as a Security Group which does not have the “read” or “Apply group policy” permission) preventing ALL of the users in OU1 from having the policy applied. (GPO status is the status of its replication within the forest, so it is not relevant here.)

Question No: 247 HOTSPOT – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: quot;Computer\ \Server1 cannot be found. The network path was not found.quot;

From Server1, you successfully connect to Server2 by using Server Manager.

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management.

What should you configure? To answer, select the appropriate option in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 248 – (Topic 3)

You have a server named Server1 that runs a Server Core installation of Windows Server

2012 R2 Standard. You establish a Remote Desktop session to Server1.

You need to identify which task can be performed on Server1 from within the Remote Desktop session.

What should you identify?

  1. Install a feature by using Server Manager.

  2. Modify the network settings by using Sconfig.

  3. Disable services by using Msconfig.

  4. Join a domain by using the System Properties.

Answer: B Explanation:

In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.

References:

http://technet.microsoft.com/en-us/library/jj647766.aspx

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80.

Question No: 249 – (Topic 3)

You have a network printer connected to print server. You need to be able to print if print server goes down.

What should you configure?

  1. branch office direct printing

  2. printer pooling

  3. spooling

  4. Print forwarding

Answer: A Explanation:

Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print.

Branch Office Direct Printing requires the following operating systems: Windows Server 2012

Windows 8

Question No: 250 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual- core processors and 16 GB of RAM.

You install the Hyper-V server role in Server1.

You plan to create two virtual machines on Server1.

You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously.

What should you configure on each virtual machine?

  1. Dynamic Memory

  2. NUMA topology

  3. Memory weight

  4. Resource Control

Answer: A

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 231-240

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 231 HOTSPOT – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2.

Several users are members of the local Administrators group.

You need to ensure that all local administrators receive User Account Control (UAC) prompts when they run a Microsoft Management Console (MMC).

Which settings should you modify from the Local Security Policy? To answer, select the appropriate settings in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

B. UAC Is controlled by local security policy. Computer Configuration\Windows Settings\Security Settings\Local

Policies\Security Option

Question No: 232 – (Topic 3)

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1.

Server2 is configured to obtain an IP address automatically.

In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2.

You need to ensure that Server2 can obtain the same IP address. What should you modify on Server1?

  1. The Name Protection settings of Scope1

  2. The MAC address of Res_Server2

  3. The Advanced settings of Res_Server2

  4. The Network Access Protection Settings of Scope1

Answer: B Explanation:

DHCP reservations are given based upon MAC address (at least on IPv4/DHCPv4).

For clients that require a constant IP address, you can either manually configure a static IP address, or assign a reservation on the DHCP server. Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. DHCP reservations provide a mechanism by which IP addresses may be permanently assigned to a specific client based on the MAC address of that client. The MAC address of a Windows client can be found running the ipconfig /all command.

For Linux systems the corresponding command is ifconfig -a. Once the MAC address has been identified, the reservation may be configured using either the DHCP console or at the command prompt using the netsh tool.

Media access control (MAC) address authorization functions in the same way as automatic number identification (ANI) authorization, but it is used for wireless clients and clients connecting to your network by using an 802.1X authenticating switch. Since the network adapter was replaced, you need to modify the MAC address on Server1 to ensure that Server2 can obtain the same IP address.

Reference: http://technet.microsoft.com/en-us/library/dd197535(v=WS.10).aspx

Question No: 233 HOTSPOT – (Topic 3)

Your network contains a domain controller named dc5.adatum.com that runs Windows Server 2012 R2.

You discover that you can connect successfully to DC5 over the network, but you receive a request timed out message when you attempt to ping DC5.

You need to configure DC5 to respond to ping request.

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 234 – (Topic 3)

You have a print server named Server1.

You install a printer on Server1. You share the printer as Printer1.

You need to configure Printer1 to be available only from 19:00 to 05:00 every day. Which settings from the properties of Printer1 should you modify?

  1. Sharing

  2. Security

  3. Advanced

  4. Device Settings

  5. Ports

Answer: C Explanation:

When navigating to the printer properties, the Properties tab is divided into several different

tabs of which the Advanced tab will give you access to the scheduling where you can configure the availability of the printer.

Reference: http://technet.microsoft.com/en-us/library/cc722526.aspx

Question No: 235 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2.

You need to uninstall Active Directory from DC5 manually. Which tool should you use?

  1. The dsamain.exe command

  2. The ntdsutil.exe command

  3. The Remove-ADComputer cmdlet

  4. The Remove-WindowsFeature cmdlet

Answer: C Explanation:

The Remove-ADComputer cmdlet removes an Active Directory computer. Example: Remove-ADComputer -Identity quot;FABRIKAM-SRV4quot;

Remove one particular computer.

References:

http://technet.microsoft.com/en-us/library/ee662310.aspx http://support.microsoft.com/kb/216498 http://technet.microsoft.com/en-us/library/ee617250.aspx

Question No: 236 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2.

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly.

You need to ensure that the feature can be installed on Server1. What should you do?

  1. Run the Add-AppxProvisionedPackage cmdlet.

  2. Remove the .NET Framework 4.5 Features feature.

  3. Connect Server1 to the Internet.

  4. Install the Web Server (IIS) server role.

Answer: C Explanation:

The files needed are no longer available on the local Hard drive. We need to connect the server to the Internet.

Important to note that when starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by default. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By default, if feature files are not available on the destination server that is running Windows Server 2012 R2 R2 Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 2: Configure server roles and Features, p. 117

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80

Question No: 237 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user.

All users have the necessary permissions to access only their home folder.

The users report that when they access Share1, they can see the home folders of all the users.

You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?

  1. From Windows Explorer, modify the properties of the volume that contains Share1.

  2. From Server Manager, modify the properties of the volume that contains Share1.

  3. From Server Manager, modify the properties of Share1.

  4. From Windows Explorer, modify the properties of Share1.

Answer: C

Question No: 238 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed.

You need to ensure that only the latest version of Appl.exe can run on the client computers. What should you create?

  1. An application control policy packaged app rule

  2. A software restriction policy certificate rule

  3. An application control policy Windows Installer rule

  4. An application control policy executable rule

Answer: D Explanation:

A. A publisher rule for a Packaged app is based on publisher, name and version B. You can create a certificate rule that identifies software and then allows or does not allow the software to run, depending on the security level.

  1. For .msi or .msp

  2. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if digital certificates are processed when a user or process attempts to run software with an .exe file name extension. This security setting is used to enable or disable certificate rules, a type of software restriction policies rule. With software restriction policies, you can create a certificate rule that will allow or disallow software that is signed by Authenticode to run, based on the digital certificate that is associated with the software. In order for certificate rules to take effect, you must enable this security setting. When certificate rules are enabled, software restriction policies will check a certificate revocation list (CRL) to make sure the software’s certificate and signature are valid. This may decrease performance when start signed programs. You can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes.

Question No: 239 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled.

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope.

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1.

You need to ensure that the virtual machines can use Server1 as a DHCP server. What should you do?

  1. Enable MAC address spoofing on Server1.

  2. Enable single-root I/O visualization (SR-IOV) on Server1.

  3. Disable the DHCP guard on Server1.

  4. Disable the DHCP guard on all of the virtual machines that are DHCP clients.

Answer: C Explanation:

DHCP guard setting

This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server.

Question No: 240 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees.

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?

  1. The Security settings of Employees

  2. The WMI filter for GP1

  3. The Block Inheritance option for Employees

  4. The Security settings of GP1

Answer: D Explanation:

  1. Wrong Group

  2. Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer.

  3. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher sites, domains, or organizational units from being automatically inherited by the child-level.

  4. Set Managers to – Members of this security group are exempt from this Group Policy object.

Security settings.

You use the Security Settings extension to set security options for computers and users within the scope of a Group Policy object. You can define local computer, domain, and network security settings.

Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 221-230

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 221 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain

contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

On Server1, you create a virtual machine named VM1.

When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as shown in the following exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to add the RemoteFX 3D Video Adapter to VM1. What should you do first?

  1. On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet

  2. On Server1, install the Media Foundation feature.

  3. On Server1, run the Enable-VMRemoteFxPhysicalVideoAdaptercmdlet.

  4. On Server1, install the Remote Desktop Visualization Host (RD Visualization Host) role

service.

Answer: D Explanation:

Remote Desktop services are not available in server core installation; you need to add the role.

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: Installing and Configuring servers, Objective 1.2: Configure servers, p. 19 http://technet.microsoft.com/en-us/library/hh848506(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848520(v=wps.620).aspx http://technet.microsoft.com/en-us/library/ff817586(v=ws.10).aspx

Question No: 222 – (Topic 3)

You have a file server named File1 that runs Windows Server 2012 R2.

File1 contains a shared folder named Share1. Share1 contains an Application named SalesAppl.exe.

The NTFS permissions for Share1 are shown in the following table.

Ensurepass 2017 PDF and VCE

The members of L_Sales discover that they cannot add files to Share1. Domain users can run SalesAppl.exe successfully.

You need to ensure that the members of L_Sales can add files to Share1. What should you do?

  1. Add the Domain Users group to L_Sales.

  2. Add L_Sales to the Domain Users group.

  3. Edit the Share permissions.

  4. Edit the NTFS permissions.

Answer: C Explanation:

Based on the NTFS permissions, these users should be able to add files (as they have the “write” permission), so they must have read-only share permissions preventing them from doing so.

Question No: 223 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You have fixed-size VHD named Files.vhd.

You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements:

->Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines.

->Minimize the amount of disk space used.

What should you do?

  1. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file.

  2. Convert Files.vhd to a dynamically expanding VHD?

  3. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file.

  4. Create differencing VHDs that use Files.vhd as the parent disk.

Answer: D Explanation:

  1. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s

  2. Single VHD not available to multiple VM’s. Changes wouldn’t be reflected

  3. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s

  4. Child disk for multiple VM’s with Files.vhd as parent. A differencing disk is associated with another virtual hard disk that you select when you create the differencing disk. This

means that the disk to which you want to associate the differencing disk must exist first. This virtual hard disk is called the “parent” disk and the differencing disk is the “child” disk. The parent disk can be any type of virtual hard disk.

The differencing disk stores all changes that would otherwise be made to the parent disk if the differencing disk was not being used. The differencing disk provides an ongoing way to save changes without altering the parent disk. You can use the differencing disk to store changes indefinitely, as long as there is enough space on the physical disk where the differencing disk is stored. The differencing disk expands dynamically as data is written to it and can grow as large as the maximum size allocated for the parent disk when the parent disk was created.

Question No: 224 – (Topic 3)

Your network contains an Active Directory domain named contoso.com.

The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.

You are configuring a Group Policy object (GPO) named GPO1.

You need to assign User1 the Back up files and directories user right to all of the computer accounts in OU1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. From User Configuration in GPO1, modify the security settings.

  2. Link GPO1 to OU1.

  3. From Computer Configuration in GPO1, modify the security settings.

  4. Modify the Delegation settings of GPO1.

  5. Link GPO1 to OU2.

Answer: B,C

Question No: 225 HOTSPOT – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity.

All roles are removed completely from Server1.

You mount a Windows Server 2012 R2 installation image to the C:\Source folder. You need to install the DNS Server server role on Server1.

Which folder should you use as the source? To answer, select the appropriate folder in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

WinSxS, the side-by-side component store enables administrators to activate any of the features included with Windows Server 2012 R2 without having to supply an installation medium.

References:

http://blogs.technet.com/b/askpfeplat/archive/2013/02/24/how-to-reduce-the-size-of-the- winsxs-directory-andfree-up-disk-space-on-windows-server-2012-using-features-on- demand.aspx

Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 1: Installing and configuring servers, Objective 1.1: Install servers, p. 10.

Question No: 226 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1.

You share a printer named Printer1 on Server1.

You need to configure Printer1 to meet the following requirements:

->Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.

->Prevent other users from sending print jobs to Printer1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Remove the permissions for the Creator Owner group.

  2. Assign the Print permission to the Administrators group.

  3. Remove the permissions for the Everyone group.

  4. Assign the Print permission to the Server Operators group.

  5. Assign the Print permission to Group1.

Answer: C,E Explanation:

C. To prevent other users from sending print jobs to Printer1

E. To enable Group1 to send print jobs.

Note: The Server Operators group, the Administrators group, and the Print Operators group are all built-in and already have permissions to send print jobs.

Question No: 227 – (Topic 3)

You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server.

You need to ensure that client computers can establish PPTP connections to Server1.

Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.)

  1. An inbound rule for protocol 47

  2. An outbound rule for protocol 47

  3. An inbound rule for TCP port 1723

  4. An inbound rule for TCP port 1701

  5. An outbound rule for TCP port 1723

  6. An outbound rule for TCP port 1701

Answer: A,C Explanation:

The following is a list of firewall ports which need to be opened for the various VPN tunnel protocols:

For PPTP:

IP Protocol=TCP, TCP Port number=1723 lt;- Used by PPTP control path IP Protocol=GRE (value 47) lt;- Used by PPTP data path

For L2TP:

IP Protocol Type=UDP, UDP Port Number=500 lt;- Used by IKEv1 (IPSec control path) IP Protocol Type=UDP, UDP Port Number=4500 lt;- Used by IKEv1 (IPSec control path) IP Protocol Type=ESP (value 50) lt;- Used by IPSec data path

For SSTP:

IP Protocol=TCP, TCP Port number=443 lt;- Used by SSTP control and data path For IKEv2:

IP Protocol Type=UDP, UDP Port Number=500 lt;- Used by IKEv2 (IPSec control path) IP Protocol Type=UDP, UDP Port Number=4500 lt;- Used by IKEv2 (IPSec control path) IP Protocol Type=ESP (value 50) lt;- Used by IPSec data path

Question No: 228 – (Topic 3)

How can you manage a newly installed Windows Server 2012 R2 core from another Windows Server 2012 R2 with computer manager?

Exhibit:

Ensurepass 2017 PDF and VCE

  1. 1

  2. 2

  3. 4

  4. 8

Answer: A

Question No: 229 – (Topic 3)

You have a laptop named Computer1. Computer1 runs Windows 8 Enterprise.

Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1.

For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system. You install the drivers for the wireless network adapter.

You need to ensure that you can connect to Network1 from Windows Server 2012 R2.

What should you do?

  1. Restart the WLAN AutoConfig service.

  2. From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings.

  3. From a local Group Policy object (GPO), configure the settings of Windows Connection Manager.

  4. From Server Manager, install the Wireless LAN Service feature.

Answer: D Explanation:

The Wireless LAN service is a feature in Windows Server庐 2012 R2 that you can use to enable the wireless WLAN AutoConfig service, and to configure the WLAN AutoConfig service for automatic startup. Once enabled, the WLAN AutoConfig service dynamically selects which wireless network the computer automatically connects to, and configures the necessary settings on the wireless network adapter. This includes automatically selecting and connecting to a more preferred wireless network when one becomes available.

To enable the Wireless LAN Service

In Server Manager Dashboard, click Manage, and then click Add Roles and Features. The Add Roles and Features Wizard opens.

Click Next. In Select installation type, select Role-based or feature-based installation, and then click Next.

In Select destination server, enable Select a server from the server pool, and in Server Pool, select the server for which you want to enable the Wireless LAN Service, and then click Next.

In Select server roles, click Next.

In Select Server features, in Features, select Wireless LAN Service, and then click Next. Reference: http://technet.microsoft.com/en-us/library/hh994698.aspx

Question No: 230 HOTSPOT – (Topic 3)

You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named DC1.

You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1.

What should you configure? To answer, select the appropriate object in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Hyper-V integration services are updated with a new service that allows Hyper-V administrators to copy files to the virtual machine while the virtual machine is running without using a network connection.

In previous versions of Hyper-V, a Hyper-V administrator may have needed to shut down a virtual machine to copy files to it. A new Hyper-V integration service has been added that allows the Hyper-V administrator to copy files to a running virtual machine without using a network connection. This will eliminate time synchronization.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 211-220

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 211 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2.

You have a written security policy that states the following:

->Only required ports must be open on the servers.

->All of the servers must have Windows Firewall enabled.

->Client computers used by administrators must be allowed to access all of the ports on all of the servers.

->Client computers used by the administrators must be authenticated before the client computers can access the servers.

You have a client computer named Computer1 that runs Windows 8.

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

  1. On Computer1, create a connection security rule.

  2. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option.

  3. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option.

  4. On Computer1, create an inbound rule and select the Allow the connection if it is secure option.

  5. On Computer1, create an outbound rule and select the Allow the connection if it is secure option.

  6. On all of the servers, create a connection security rule.

Answer: A,C,F Explanation:

Unlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy.

Traffic that matches a firewall rule that uses the Allow connection if it is secure setting bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. This method is supported on Windows Vista or Windows Server 2008.

References:

http://technet.microsoft.com/en-us/library/cc772017.aspx

http://technet.microsoft.com/en-us/library/cc753463.aspx

Question No: 212 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains three member servers.

The servers are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

All client computers run Windows 8. All client computers receive updates from Server2.

On Server3, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is not included in the Windows 8 installation media.

You need to ensure that when users connect to the printer for the first time, the printer driver is installed automatically on their client computer.

What should you do?

  1. From the Windows Deployment Services console on Server1, add the driver package for Printer1.

  2. From the Update Services console on Server2, import and approve updates.

  3. From Windows PowerShell on Server3, run the Add-PrinterDriver cmdlet.

  4. From the Print Management console on Server3, add additional drivers for Printer1.

Answer: D

Question No: 213 – (Topic 3)

Your network contains an Active Directory domain named contoso.com.

You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings.

You need to create a new starter GPO based on the settings in GPO1.

You must achieve this goal by using the minimum amount of administrative effort. What should you do?

  1. Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.

  2. Create a new starter GPO and manually configure the policy settings of the starter GPO.

  3. Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the new GPO, and then click Restore from Backup.

  4. Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste.

Answer: B Explanation:

Although GPOs and Starter GPOs can both be copied, and a Starter GPO can be used to create a new GPO (as that is their purpose), an existing GPO cannot be copied to a new Starter GPO (unfortunately).

Question No: 214 DRAG DROP – (Topic 3)

You have a print server named Server1Server1 runs Windows Server 2008 R2. You have a file server named Server2. Server2 runs Windows Server 2012 R2.

You need to migrate all of the printers on Server1 to Server2. Which actions should you perform on the servers?

To answer, drag the appropriate action to the correct servers in the answer area. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 215 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The network contains a domain controller named DC1 that has the DNS Server server role installed. DC1 has a standard primary DNS zone for contoso.com.

You need to ensure that only client computers in the contoso.com domain will be able to add their records to the contoso.com zone.

What should you do first?

  1. Sign the contoso.com zone.

  2. Modify the Security settings of DC1.

  3. Modify the Security settings of the contoso.com zone.

  4. Store the contoso.com zone in Active Directory.

Answer: D Explanation:

Only Authenticated users can create records when zone is stored in AD.

Secure dynamic updates allow an administrator to control what computers update what names and prevent unauthorized computers from overwriting existing names in DNS.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 6: Network Administration, Lesson 2: Implementing DNSSEC, p. 237 http://technet.microsoft.com/en-us/library/cc731204(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc755193.aspx

Question No: 216 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You need to configure a central store for the Group Policy Administrative Templates.

What should you do on DC1?

  1. From Server Manager, create a storage pool.

  2. From Windows Explorer, copy the PolicyDefinitions folder to the SYSVOL\contoso.com\policies folder.

  3. From Server Manager, add the Group Policy Management feature

  4. From Windows Explorer, copy the PolicyDefinitions folder to the NETLOGON share.

Answer: B

Explanation:

  1. Create Disk Storage Pool

  2. PolicyDefinitions folder in SYSVOL

  3. Group Policy Management is a console for GPO Mgmt

  4. Folder is for logon scripts

Policy Definitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory, they are replicated to every DC in the domain; by extension, the ADMX- aware Group Policy Management Console in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additional source of ADMX files, and will report them accordingly when setting your policies.

By default, the folder is not created. Whether you are a single DC or several thousand, I would

Strongly recommend you create a Central Store and start using it for all your ADMX file storage. It really does work well.

The Central Store

To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. To create a Central Store for .admx and .adml files, create a folder that is named Policy Definitions in the following location:

\\FQDN\SYSVOL\FQDN\policies.

Question No: 217 – (Topic 3)

Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU.

You need to ensure that the domain’s Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups.

What should you do?

  1. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the This group is a member of list.

  2. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the Members of this group list.

  3. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the This group is a member of list.

  4. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the Members of this group list.

Answer: A

Question No: 218 – (Topic 3)

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com.

The network has Microsoft Exchange Server 2010 deployed. You need to create a mail-enabled distribution group.

Which type of group should you create?

  1. Global

  2. Local

  3. Domain local

  4. Universal

Answer: D Explanation:

Universal groups Groups that are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.

Microsoft Exchange Server 2007: Implementation and Administration. By Jim McBee, Benjamin Craig page 248: Only universal groups should be used as mail-enabled groups.

Question No: 219 – (Topic 3)

You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other.

  1. remove the vswitch and recreate it as private.

  2. add new vswitch

  3. remove vswitch and recreate it as public

  4. adjust srv-io settings

Answer: A Explanation:

You cannot change the settings of a vswitch with SR-IOV enabled, so you must delete it and recreate it.

Question No: 220 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2.

You need to create a network adapter team from the three network adapters connected to LAN1.

Which tool should you use?

  1. Routing and Remote Access

  2. Network and Sharing Center

  3. Server Manager

  4. Network Load Balancing Manager

Answer: C

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 201-210

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 201 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM.

Server1 hosts five virtual machines that run Windows Server 2012 R2.

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss.

Which settings should you modify?

  1. BIOS

  2. Automatic Start Action

  3. Automatic Stop Action

  4. Integration Services

Answer: C Explanation:

The Automatic Stop Action setting should be modified because it will allow you to configure:

Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down.

OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine.

OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine.

Reference: http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/

Question No: 202 – (Topic 3)

Your network contains multiple subnets.

On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.

You need to ensure that client computers can resolve IP addresses to host names. What should you do first?

  1. Create a GlobalNames zone.

  2. Convert the contoso.com zone to an Active Directory-integrated zone.

  3. Configure dynamic updates for contoso.com.

  4. Create a reverse lookup zone.

Answer: D Explanation:

Use a reverse lookup zone to be able to resolve IP addresses to host names.

Question No: 203 – (Topic 3)

Your network contains an Active Directory domain named contoso.com.

You discover that when you join client computers to the domain manually, the computer accounts are created in the Computers container.

You need to ensure that new computer accounts are created automatically in an organizational unit (OU) named Corp.

Which tool should you use?

  1. net.exe

  2. redircmp.exe

  3. regedit.exe

  4. dsadd.exe

Answer: B Explanation:

  1. Used to stop/start protocols

  2. Redirects the default container for newly created computers to a specified, target organizational unit

  3. Modify local registry entries

  4. Adds specific types of objects to the directory

Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers.

You must run the redircmp command from an elevated command prompt. Redircmp.exe is located in the C:\Windows\System32 folder.

You must be a member of the Domain Admins group or the Enterprise Admins group to use this tool.

Question No: 204 – (Topic 3)

Your network contains an Active Directory forest named adatum.com. The forest contains a child domain named asia.adatum.com. The asia.adatum.com child domain contains a server named DHCP1 that runs Windows Server 2012 R2.

You install the DHCP Server server role on DHCP1.

You have access to the administrative accounts shown in the following table.

Ensurepass 2017 PDF and VCE

You need to authorize DHCP1. Which user account should you use?

  1. Admin1

  2. Admin2

  3. Admin3

  4. Admin4

Answer: B

Question No: 205 – (Topic 3)

You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone.

You discover that the root hints were removed from Server1. You need to view the default root hints of Server1.

What should you do?

  1. From Event Viewer, open the DNS Manager log.

  2. From Notepad, open the Cache.dns file.

  3. From Windows Powershell, run Get-DNSServerDiagnostics.

  4. From nslookup, run root server1.contoso.com

Answer: B Explanation:

  1. Allows you to troubleshoot DNS issues

  2. DNS Server service implements root hints using a file, Cache.dns, stored in the systemroot\System32\Dnsfolder on the server

  3. Gets DNS event logging details

  4. nslookup is used to query the DNS server

Question No: 206 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

The domain contains a server named Server1 that runs Windows Server 2012 R2.

You need to ensure that when users log on to Server1, their user account is added automatically to a local group named Group1 during the log on process.

Which Group Policy settings should you modify?

  1. User Rights Assignment

  2. Preferences

  3. Security Options

  4. Restricted Groups

Answer: B Explanation:

With Preferences, local and domain accounts can be added to a local group without affecting the existing members of the group

References:

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 361.

http://technet.microsoft.com/en-us/library/cc785631(v=ws.10).aspx http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-

administrator-groups/

http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831424.aspx

Question No: 207 DRAG DROP – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured as the only domain controller.

You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully.

Which Windows PowerShell command should you run?

To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

The Get-ADUsercmdlet gets a user object or performs a search to retrieve multiple user objects.

lastLogondate is the correct parameter as the questions asks for the last time each user was authenticated successfully.

Question No: 208 – (Topic 3)

You have a server named Server1 that has the Print and Document Services server role installed.

You need to provide users with the ability to manage print jobs on Server1 by using a web browser.

What should you do?

  1. Start the Printer Extensions and Notifications service and set the service to start automatically.

  2. Install the LPD Service role service.

  3. Start the Computer Browser service and set the service to start automatically.

  4. Install the Internet Printing role service.

Answer: D Explanation: References:

Internet printing makes it possible for computers running Windows Server 2008 to use printers located anywhere in the world by sending print jobs using Hypertext Transfer Protocol (HTTP).

http://technet.microsoft.com/en-us/library/cc731368(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc731857.aspx

Question No: 209 – (Topic 3)

Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2.

You install the Network Load Balancing feature on VM1 and VM2.

You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB).

Which virtual machine settings should you configure on VM1 and VM2?

  1. DHCP guard

  2. MAC address

  3. Router guard

  4. Port mirroring

Answer: B Explanation:

When MAC addresses are not assigned to virtual machines, it could cause network problems.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V hosts, p. 313-319. http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx

Question No: 210 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

You need to ensure that the local administrator account on all computers is renamed to L.Admin.

Which Group Policy settings should you modify?

  1. Restricted Groups

  2. Security Options

  3. User Rights Assignment

  4. Preferences

Answer: B Explanation:

In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options.

In the details pane, double-click Accounts: Rename administrator account.

The Security Options node includes security settings regarding interactive logon, digital signing of data, restrictions of access to floppy and CD-ROM drives, unsigned driver installations as well as logon dialog box behavior. This category also includes options to configure authentication and communication security within Active Directory.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-410 Dumps with VCE and PDF 191-200

EnsurePass
2017 Sep Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-410.html

Installing and Configuring Windows Server 2012

Question No: 191 – (Topic 2)

You have a server named Server1 that runs Windows Server 2012 R2.

A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to ensure that you can enable NTFS disk quotas for volume D. What should you do first?

  1. Install the File Server Resource Manager role service.

  2. Format volume D.

  3. Run the convert.exe command.

  4. Convert the disk to a dynamic disk.

Answer: B Explanation:

ReFS-formatted disks cannot use NTFS disk quotas, so the drive must be formatted as an NTFS partition

Question No: 192 – (Topic 2)

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup.

On Server1, you add Server2 to Server Manager.

When you attempt to connect to Server2 from Server Manager, you receive the following error message: quot;Credentials not valid.quot;

You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.

What should you do?

  1. On Server 2, run the Configure-SmRemoting cmdlet.

  2. On Server 1, run the Set-NetFirewallRule cmdlet.

  3. On Server 1, run the Set-Item cmdlet.

  4. On Server 2, install the Remote Server Administration Tools (RSAT).

Answer: C Explanation:

Since they are both workgroup members, server 2 will have to be added to server 1 as a trusted host

Question No: 193 – (Topic 2)

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

You need to add a graphical user interface (GUI) to Server1. Which tool should you use?

  1. The setup.exe command

  2. The dism.exe command

  3. The imagex.exe command

  4. The Add-WindowsPackage cmdlet

Answer: B Explanation:

The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM:

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui- Shell /featurename:Server-Gui-Mgmt

Question No: 194 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. Client computers run either Windows 7 or Windows 8.

All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of the client computers use a DNS server named Server1.

You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the contoso.com DNS zone.

You need to ensure that the client computers locate the ISATAP router. What should you do?

  1. Run the Set-DnsServerGlobalQueryBlockList cmdlet on Server1.

  2. Configure the Network Options Group Policy preference of GPO1.

  3. Run the Add-DnsServerResourceRecord cmdlet on Server1.

  4. Configure the DNS Client Group Policy setting of GPO1.

Answer: A Explanation:

The Set-DnsServerGlobalQueryBlockList command will change the settings of a global query block list which you can use to ensure that client computers locate the ISATAP router.

Windows Server 2008 introduced a new feature, called “Global Query Block list”, which prevents some arbitrary machine from registering the DNS name of WPAD. This is a good security feature, as it prevents someone from just joining your network, and setting himself up as a proxy. The dynamic update feature of Domain Name System (DNS) makes it possible for DNS client computers to register and dynamically update their resource records with a DNS server whenever a client changes its network address or host name.

This reduces the need for manual administration of zone records. This convenience comes at a cost, however, because any authorized client can register any unused host name, even a host name that might have special significance for certain Applications. This can allow a malicious user to take over a special name and divert certain types of network traffic to that user’s computer. Two commonly deployed protocols are particularly vulnerable to this type of takeover: the Web Proxy Automatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel Addressing Protocol (ISATAP). Even if a network does not deploy these protocols, clients that are configured to use them are vulnerable to the takeover that DNS dynamic update enables. Most commonly, ISATAP hosts construct their PRLs by using DNS to locate a host named isatap on the local domain. For example, if the local domain is corp.contoso.com, an ISATAP-enabled host queries DNS to obtain the IPv4 address of a host named isatap.corp.contoso.com. In its default configuration, the Windows Server 2008 DNS Server service maintains a list of names that, in effect, it ignores when it receives a query to resolve the name in any zone for which the server is authoritative.

Consequently, a malicious user can spoof an ISATAP router in much the same way as a malicious user can spoof a WPAD server: A malicious user can use dynamic update to register the user’s own computer as a counterfeit ISATAP router and then divert traffic between ISATAP-enabled computers on the network. The initial contents of the block list depend on whether WPAD or ISATAP is already deployed when you add the DNS server role to an existing Windows Server 2008 deployment or when you upgrade an earlier version of Windows Server running the DNS Server service. Add- DnsServerResourceRecord – The Add-DnsServerResourceRecordcmdlet adds a resource record for a Domain Name System (DNS) zone on a DNS server. You can add different

types of resource records. Use different switches for different record types. By using this cmdlet, you can change a value for a record, configure whether a record has a time stamp, whether any authenticated user can update a record with the same owner name, and change lookup timeout values, Windows Internet Name Service (WINS) cache settings, and replication settings. Set-DnsServerGlobalQueryBlockList – The Set- DnsServerGlobalQueryBlockListcmdlet changes settings of a global query block list on a Domain Name System (DNS) server. This cmdlet replaces all names in the list of names that the DNS server does not resolve with the names that you specify. If you need the DNS server to resolve names such as ISATAP and WPAD, remove these names from the list.

Web Proxy Automatic Discovery Protocol (WPAD) and Intra-site Automatic Tunnel Addressing Protocol (ISATAP) are two commonly deployed protocols that are particularly vulnerable to hijacking.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649874.aspx

http://technet.microsoft.com/en-us/library/jj649909.aspx

Question No: 195 – (Topic 2)

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2.All servers run Windows Server 2012 R2.

On DC2, you open Server Manager and you add Server1 as another server to manage.

From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

You need to ensure that when you right-click Server1, you see the option to run the DHCP console.

What should you do?

  1. In the domain, add DC2 to the DHCP Administrators group.

  2. On Server1, install the Feature Administration Tools.

  3. On DC2 and Server1, run winrmquickconfig.

  4. On DC2, install the Role Administration Tools.

Answer: D

Reference: http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx

Question No: 196 HOTSPOT – (Topic 2)

The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

If you want to compact a differencing virtual hard disk or an undo disk, you must merge the changes to the parent disk and then compact the parent disk, if it is a dynamically expanding virtual hard disk.

You can compact a dynamically expanding virtual hard disk. You cannot compact any other type of virtual hard disk. However, you can convert a fixed-size virtual hard disk to a dynamically expanding virtual hard disk and then compact the disk. If you want to compact a differencing virtual hard disk or an undo disk, you must merge the changes to the parent disk and then compact the parent disk, if it is a dynamically expanding virtual hard disk.

Question No: 197 – (Topic 2)

You have a server named Server1 that runs Windows Server 2012 R2.

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly.

You need to ensure that the feature can be installed on Server1. What should you do?

  1. Run the Add-AppxProvisionedPackage cmdlet.

  2. Disable User Account Control (UAC).

  3. Connect Server1 to the Internet.

  4. Remove the .NET Framework 4.5 Features feature.

Answer: C

Question No: 198 – (Topic 2)

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You need to configure VM4 to track the CPU, memory, and network usage. What should you configure?

  1. NUMA topology

  2. Resource control

  3. Resource metering

  4. Virtual Machine Chimney

  5. The VLAN ID

  6. Processor Compatibility

  7. The startup order

  8. Automatic Start Action

  9. Integration Services

  10. Port mirroring

  11. Single-root I/O virtualization

Answer: C Explanation:

Metrics collected for each virtual machine using resource metering:

->Average CPU usage, measured in megahertz over a period of time.

->Average physical memory usage, measured in megabytes.

->Minimum memory usage (lowest amount of physical memory).

->Maximum memory usage (highest amount of physical memory).

->Maximum amount of disk space allocated to a virtual machine.

->Total incoming network traffic, measured in megabytes, for a virtual network adapter.

->Total outgoing network traffic, measured in megabytes, for a virtual network adapter

Reference: http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource- metering-in-windows-server-2012-server-8-beta.aspx

Question No: 199 – (Topic 2)

Your company has a main office and four branch offices. The main office contains a server named Server1 that runs Windows Server 2012 R2.

The IP configuration of each office is configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets.

Which command should you run?

A. route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1

B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1

C. route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0

D. route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1

Answer: B Explanation:

These parameters will allow communication with all the hosts.

Ensurepass 2017 PDF and VCE

References:

Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.192, 196

Topic 3, Volume C

Question No: 200 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2 Service Pack 1 (SP1). One of the domain controllers is named DC1.

The network contains a member server named Server1 that runs Windows Server 2012 R2.

You need to promote Server1 to a domain controller by using install from media (IFM). What should you do first?

  1. Create a system state backup of DC1.

  2. Create IFM media on DC1.

  3. Upgrade DC1 to Windows Server 2012 R2.

  4. Run the Active Directory Domain Services Configuration Wizard on Server1.

  5. Run the Active Directory Domain Services Installation Wizard on DC1.

Answer: C Explanation:

A. Backs up system state data to be restored

  1. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard and add DC to existing domain

  2. Need to add ADDS role first

  3. Wrong server

Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation

media to use for another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domain is the best option such as a branch office scenario where network is slow, unreliable and costly.

IFM will minimize replication traffic during the installation because it uses restored backup files to populate the AD DS database. This will significantly reduce the amount of traffic copied over the WAN link.

Things to remember:

If you are deploying your first Domain Controller in the domain, you cannot use IFM.

The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server.

If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC must be at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM.

100% Free Download!
Download Free Demo:70-410 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE