This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Sat Apr 27 11:28:32 2024 / +0000 GMT ___________________________________________________ Title: 70-410 Exam Pass 100% OR Money Back Download 70-410 New Exam Dumps From Braindump2go Instantly! (91-100) --------------------------------------------------- MICROSOFT OFFICIAL: New Updated 70-410 Exam Questions from Braindump2go 70-410 pdf dumps and 70-410 vce dumps! Welcome to download the newest Braindump2go 70-410 vce&pdf dumps: http://www.braindump2go.com/70-410.html (471 Q&As) Instant Download 70-410 PDF Files! New Updated 471 Exam Questions and Answers help 100% Exam Pass! 70-410 Certification Get Quickly! Exam Code: 70-410Exam Name Installing and Configuring Windows Server 2012Certification Provider: MicrosoftCorresponding Certifications: MCSA, MCSA: Windows Server 2012, MCSE, MCSE: Desktop Infrastructure, MCSE: Private Cloud, MCSE: Server InfrastructureKeywords:70-410 Dumps,70-410 Exam Questions,70-410 VCE,70-410 VCE Free,70-410 PDF,70-410 Lab Manual PDF,70-410 Practice Exams,70-410 Practice Tests,70-410 Installing and Configuring Windows Server 2012 QUESTION 91You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.) You create a virtual machine on Server1. You need to ensure that you can configure a pass-through disk for the virtual machine. What should you do? A.    Delete partition E.B.    Convert Disk 1 to a GPT diskC.    Convert Disk 1 to a dynamic disk.D.    Take Disk 1 offline. Answer: DExplanation:Pass-Through Disk must be offlinePass-through Disk ConfigurationHyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring thevolume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be aStorage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest hasexclusive access to the storage, it must be placed in an Offline state from the Hyper-V serverperspectivehttp://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspxhttp://technet.microsoft.com/pt-pt/library/ff404147%28v=ws.10%29.aspx QUESTION 92Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server2 runs Windows Server 2012 R2. You create a security template named Template 1 by using the Security Templates snap-in. You need to apply template 1 to Server 2. Which tool should you use? A.    Security Templates.B.    Computer Management.C.    Security Configuration and Analysis.D.    System Configuration. Answer: CExplanation:Security templates are inactive until imported into a Group Policy object or the Security Configurationand Analysis. http://technet.microsoft.com/en-us/library/jj730960.aspx http://windows.microsoft.com/en-us/windows-vista/using-system-configuration QUESTION 93Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DCS. DC5 has a Server Core Installation of Windows Server 2012 R2. You need to uninstall Active Directory from DC5 manually. Which tool should you use? A.    The ntdsutil.exe commandB.    The dcpromo.exe commandC.    The Remove-WindowsFeaturecmdletD.    The Remove-ADComputercmdlet Answer: CExplanation:Explanation/Reference:http://technet.microsoft.com/en-us/library/hh472163.aspx#BKMK_RemoveSMhttp://technet.microsoft.com/en-us/library/cc732257.aspx#BKMK_powershell QUESTION 94You have a server named Server 2 that runs Windows Server 2012 R2. Server 2 has the Hyper-V server role installed.The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button). You create a virtual machine on Server2 named VM1. You need to ensure that you can configure a pass-through disk for VM1. What should you do? A.    Convert Disk 1 to a MBR disk.B.    Convert Disk 1 to a basic disk.C.    Take Disk 1 offline.D.    Create a partition on Disk 1. Answer: CExplanation:Pass-through Disk ConfigurationHyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspectivehttp://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper-v.aspx QUESTION 95You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations:- 16GB of RAM- A single quad-core CPU- Three network teams that have two network adapters each You add additional CPUs and RAM to Server 1. You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should you run first? A.    Set-NetAdapter.B.    Add-Net1.bfoTeamNicC.    Add-VMNetworkAdapterD.    Remove-NetLbfoTeam Answer: DExplanation:A. Sets adapter propertiesB. Add new interface to NIC TeamC. Adds vadapter to vmD. Removed NIC from hostYou need 4 virtual switches but currently only have 3 teams available. You would need to break a team first.http://technet.microsoft.com/en-us/library/jj130875(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj130850(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848564(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj130848(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj130848.aspx QUESTION 96Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.You create a security template named Template1 by using the Security Templates snap-in.You need to apply Template1 to Server2.Which tool should you use? A.    Authorization ManagerB.    Local Security PolicyC.    Certificate TemplatesD.    System Configuration Answer: BExplanation: A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. QUESTION 97Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. On DC2, you open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the option to run the DHCP console. What should you do? A.    On Server1, install the Feature Administration Tools.B.    In the domain, add DC1 to the DHCP Administrators group.C.    On DC2 and Server1, run winrm quickconfig.D.    On DC2, install the Role Administration Tools. Answer: DExplanation:http://technet.microsoft.com/en-us/library/hh831825.aspx QUESTION 98Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Manged Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? A.    From a command prompt, run sc.exe and specify the config parameter.B.    From Windows PowerShell,run Set-Service and specify the -PassThrough parameterC.    From Windows PowerShell,run Set-Service and specify the -StartupType parameterD.    From Services Console configure the General settings Answer: A QUESTION 99Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer Configuration settings and User Configuration settings.You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. What should you configure? A.    the Group Policy loopback processing modeB.    the Block Inheritance featureC.    the Enforced settingD.    the GPO Status Answer: AExplanation:A. Group Policy loopback with replace option needs to be used B. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher sites, domains, ororganizational units from being automatically inherited by the child-level C. Enforced prevent blocking at lower levelD. The GPO Status. This indicates whether either the user configuration or computer configuration of the GPOis enabled or disabled.You can use the Group Policy loopback feature to Apply Group Policy Objects (GPOs) that depend only onwhich computer the user logs on to.User Group Policy loopback processing can be enabled in one of two modes: merge or replace. In mergemode, both GPOs Applying to the user account and GPOs Applying to the computer account are processedwhen a user logs in. GPOs that Apply to the computer account are processed second and therefore takeprecedence - if a setting is defined in both the GPO(s) Applying to the user account, and the GPO(s) Applyingto the computer account, the setting in the GPO(s) Applying to the computer account will be enforced. With thereplace mode, GPOs Applying to the user account are not processed only the GPOs Applying to thecomputer account are Applied. Loopback can be set to Not Configured, Enabled, or Disabled. In the Enabled state, loopback can be set toMerge or Replace. In either case the user only receives user-related policy settings. Loopback with Replace--In the case of Loopback with Replace, the GPO list for the user is replaced in itsentirety by the GPO list that is already obtained for the computer at computer startup (during step 2 in GroupPolicy processing and precedence). The User Configuration settings from this list are Applied to the user.Loopback with Merge--In the case of Loopback with Merge, the Group Policy object list is a concatenation.The default list of GPOs for the user object is obtained, as normal, but then the list of GPOs for the computer(obtained during computer startup) is appended to this list. Because the computer's GPOs are processed afterthe user's GPOs, they have precedence if any of the settings conflict. This is a COMPUTER setting, which is found under Computer Configuration | Administrative Templates |System | Group Policy | User Group Policy Loopback Processing Mode You want to create a new OU in AD that is dedicated to computer accounts that will have loopbackprocessing enabled. Create a new GPO in your new OU to enable User Group Policy Loopback Processing and set theappropriate mode (merge / replace).You will define the user settings you want to Apply to the loopback-enabled PCs via GPOs in this same newOU. You can define these settings either in the same GPO where you enabled the User Group PolicyLoopback Processing setting, or you create another new GPO in the same OU for your user settings.Remember that when using the REPLACE mode, none of your other user GPOs will be Applied whena user logs in to a machine that has loopback processing enabled. ONLY the user settings that aredefined in the GPOs that Apply to that machine will be Applied. http://msmvps.com/blogs/cgross/archive/2009/10/12/group-policy-loopbackprocessing.aspx http://technet.microsoft.com/en-us/library/cc782810(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc731076.aspx http://technet.microsoft.com/en-us/library/cc753909.aspx http://technet.microsoft.com/en-us/library/cc778238%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/magazine/dd673616.aspx QUESTION 100Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. You install the Network Load Balancing feature on VM1 and VM2. You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). Which virtual machine settings should you configure on VM1 and VM2? A.    Router guardB.    DHCP guardC.    Port mirroringD.    MAC address Answer: DExplanation:In Hyper-V, the VM host prevents dynamic MAC address updates as an extra layer of security in thedatacenter. This is because the VM may have full administrator rights, yet it may be untrusted in thedatacenter, for example when the VM hosting is provided by an independent hosting company. In this scenario,we need to make sure that one VM cannot cause a DOS or information disclosure attack against another VM. If a VM is able to spoof its MAC address, then it can spoof the MAC addresses of other VMs and impactother VMs on that host. The physical switches have similar protections and it is up to the admin to enable thatprotection or not. If you do not enable spoofing of MAC address prior to configuring NLB on the VM you could potentially haveproblems with the NLB cluster.When configuring NLB in unicast mode on Hyper-V with enable spoofing of MAC Address disabled you maysee some of the following symptoms:When initially configuring NLB you will lose network connectivity on the network adaptor NLB was configuredon.There will be an NLB error event in the Windows Event Log stating that the network adaptor does not supportdynamic MAC address updates.After rebooting the server, NLB will appear to be bound to the network adapter, but the cluster VIP will nothave been added to the network adaptor.The cluster MAC address will still be the original MAC address associated with the network adaptor prior toconfiguring NLB. Use CMD>ipconfig /all to view the MAC address.It should start with "02-BF-***"If you ignore all previous symptoms and manually add the VIP you could get an IP conflict if there are othernodes in the cluster that have the same VIP.With that said, to allow VM guests to run NLB you need to set the VM property for "Enable spoofing of MACAddress".To enable spoofing of MAC Addresses open the Hyper-V management console. Make sure the VM is stoppedopen the properties of the VM. Select the Network Adaptor for the NLB VM and check the "Enable spoofing ofMAC Address" and click OK. Then start the VM. For those who feel the overwhelming anxiety before their 70-410 exam,Braindump2go Latest updated 70-410 Exam Dumps will help you Pass 100% in a short time preparation! 70-410 Exam Dumps PDF & VCE Full Version Instant Download! 70-410 PDF Dumps & 70-410 VCE Dumps Full Version Download(471q):  http://www.braindump2go.com/70-410.html --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2015-09-11 06:43:52 Post date GMT: 2015-09-11 06:43:52 Post modified date: 2015-09-11 06:43:52 Post modified date GMT: 2015-09-11 06:43:52 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com