getcertified4sure.com

examcollection 70 410 : May 2021 Edition




Cause all that matters here is passing the Microsoft 70 410 dumps pdf exam. Cause all that you need is a high score of braindumps 70 410 Installing and Configuring Windows Server 2012 exam. The only one thing you need to do is downloading Examcollection 70 410 practice exam exam study guides now. We will not let you down with our money-back guarantee.

Q151. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. 

Server1 hosts five virtual machines that run Windows Server 2012 R2. 

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. 

Which settings should you modify? 

A. BIOS 

B. Automatic Start Action 

C. Automatic Stop Action 

D. Integration Services 

Answer:

Explanation: 

The Automatic Stop Action setting should be modified because it will allow you to configure: “Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down. OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine. OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine. 

: http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/ 


Q152. - (Topic 3) 

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd (200GB). 

Using the Edit Virtual Disk Wizard what option should you choose? 

A. Compact 

B. Shrink 

C. Resize 

D. Convert 

Answer:

Explanation: 

After converting a dynamically expanding VHD to the VHDX format, a new Shrink menu 

option becomes available in the Hyper-V UI as shown. 

VHDX format VHDs only expose the Shrink option when there is free space in the VHDX 

file to reclaim. 


Q153. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has four network adapters. Contoso.com has two SR07’s network adapters are connected to the one LAN, local area networks (LANs). Two of ENSUREPASS – while the other two are connected to the other LAN. 

You are required to configure one of the network adapter pairs into a network adapter team. 

Which of the following actions should you take? 

A. You should consider accessing the Group Policy Management Console (GPMC) on ENSUREPASS-SR07. 

B. You should consider accessing the TS Manager console on ENSUREPASS-SR07. 

C. You should consider accessing the Server Manager console on ENSUREPASS-SR07. 

D. You should consider accessing the Remote Desktop Gateway Manager console on ENSUREPASS-SR07. 

Answer:


Q154. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and has the Hyper-V server role installed. HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server 1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

C. Disable the DHCP guard on Server1. 

D. Enable single-root I/O virtualization (SR-IOV) on Server1. 

Answer:

Explanation: 

Private virtual networks are used where you want to allow communications between virtual machine to virtual machine on the same physical server in a block diagram, a private network is an internal network without a virtual NIC in the parent partition. A private network would commonly be used where you need complete isolation of virtual machines from external and parent partition traffic. DMZ workloads running on a leg of a trihomed firewall, or an isolated test domain are examples where this type of network may be useful. 


Q155. HOTSPOT - (Topic 2) 

You have two servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

You need to ensure that Server2 can be managed by using Server Manager from Server1. 

In the table below, identify which actions must be performed on Server1 and Server2.Make only one selection in each row. Each correct selection is worth one point. 

Answer: 


Q156. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. 

You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. 

Which of the following is the cmdlet being discussed? 

A. Set-NetFirewallRule 

B. Enable-NetFirewallRule 

C. Set-NetIPsecRule 

D. Enable-NetIPsecRule 

Answer:

Explanation: 

Enable-NetFirewallRule – Enables a previously disabled firewall rule. 


Q157. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

All client computers run Windows 8. 

You deploy a server named Server1 that runs Windows Server 2012 R2. 

You install a new client-server application named App1 on Server1 and on the client 

computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080. 

You need to ensure that all of the client computers can connect to App1. The solution must 

ensure that the application can connect to Server2. 

Which Windows Firewall rule should you create on Server1? 

A. an inbound rule to allow a connection to TCP port 3080 

B. an outbound rule to allow a connection to TCP port 3080 

C. an outbound rule to allow a connection to TCP port 6444 

D. an inbound rule to allow a connection to TCP port 6444 

Answer:

Explanation: 

A. Server2 needs inbound on 3080. 

B. All ports outbound allowed by default. 

D. Server1 gets request from Client PC’s it needs an inbound rule for 6444. By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program. 


Q158. - (Topic 1) 

Your network contains an Active Directory forest that contains three domains. 

A group named Group1 is configured as a domain local distribution group in the forest root domain. You plan to grant Group1 read-only access to a shared folder named Share1.Share1 is 

located in a child domain. 

You need to ensure that the members of Group1 can access Share1. 

What should you do first? 

A. Convert Group1 to a universal security group. 

B. Convert Group1 to a global distribution group. 

C. Convert Group1 to a universal distribution group. 

D. Convert Group1 to a domain local security group. 

Answer:

Explanation: 

Universal can be used for any domain or forest. Furthermore a Universal group can span multiple domains, even the entire forest. 

References: Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install and Administer Active Directory, Objective 5.3 Create and manage Active Directory groups and Organization units, p. 289-291, 293 

http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx 


Q159. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. You install Windows Server 2012 on a new computer named DC3. You need to manually configure DC3 as a domain controller. Which tool should you use? 

A. Server Manager 

B. winrm.exe 

C. Active Directory Domains and Trusts 

D. dcpromo.exe 

Answer:


Q160. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are in the process of installing a Server Core installation of Windows Server 2012 on a new Contoso.com server, named ENSUREPASS-SR13. 

Which of the following is TRUE with regards to a installing a Server Core installation of Windows Server 2012? (Choose all that apply.) 

A. The Server Graphical Shell is installed, but not enabled. 

B. Server roles can be configured locally via the command prompt using Windows PowerShell. 

C. Server roles can be configured locally via Server Manager. 

D. You are able to access the Microsoft Management Console locally. 

E. The Desktop Experience is not available. 

Answer: B,E 

Explanation: 

A. There is no Windows shell and very limited GUI functionality. 

B. The Server Core interface is a command prompt with PowerShell support. 

C. Only Remotely using Server Manager. 

D. Microsoft Management Console is not available locally. 

E. Desktop Experience is not available. 

Server Core is a minimal server installation option for computers running on the operating 

system. Server Core provides a low-maintenance server environment with limited 

functionality. 

The minimal nature of Server Core creates limitations: 

There is no Windows shell and very limited GUI functionality. The Server Core interface is 

a command prompt with PowerShell support. 

There is limited MSI support (unattended mode only). 

Server Graphical Shell is not installed. 

Microsoft Management Console: not available locally. 

Desktop Experience: not available.