realexamdumps.com

Monday, November 12, 2018

Download 2018 Latest 70-410 Dumps Questions and Answers - Realexamdumps.com


Demo Questions For Microsoft 70-410 Exam



Question No : 1

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space. Which type of virtual hard disk should you create on the LUN?

A. Dynamically expanding VHDX
B. Fixed-size VHDX
C. Fixed-size VHD
D. Dynamically expanding VHD

Answer: B
Explanation
The virtual disk needs to be a VHDX file since it is going to be over 2TB in size and it must be fixed-size so that the space is already taken on the server (that way the server does not run out of space as the volume grows) even if the actual virtual disk does not yet hold that amount of data.

Question No : 2

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. On VM5, you install a network monitoring application named Monitor1. You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1. Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. (Choose two.)

A. Get-VM “VM6 | Set-VMNetworkAdapter-IovWeight 1
B. Get-VM “VM5 I Set-VMNetworkAdapter -IovWeight 0
C. Get-VM “VM5 | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM “VM6 | Set-VMNetworkAdapter -AllowTeaming On
E. Get-VM “VM6 | Set-VMNetworkAdapter -PortMirroring Destination
F. Get-VM “VM5 | Set-VMNetworkAdapter -AllowTeaming On

Answer: C,E
Explanation
-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. If set to Destination, it receives copied packets from the source virtual network adapter. In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which is the source.

Question No : 3

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contain several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?

A. DHCP guard
B. Port mirroring
C. Router guard
D. MAC address

Answer: D
Explanation
http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe29d11fcbb7ce/nlb-on-hyperv?forum=winserverhyperv
For NLB to be configured you need to enable MAC address spoofing.


Prepare Microsoft 70-410 Question Answers - 70-410 Exam Braindumps - Realexamdumps.com

Question No : 4

You have a print server named Server1 that runs Windows Server 2012 R2. You discover that when there are many pending print jobs, the system drive occasionally runs out of free space. You add a new hard disk to Server1.You create a new NTFS volume. You need to prevent the print jobs from consuming disk space on the system volume. What should you modify?

A. The properties on the new volume
B. The properties of the Print Spooler service 
C. The Print Server Properties
D. The properties of each shared printer

Answer: C
Explanation
Windows spools print jobs by default to the following directory as they are processed:
%SystemRoot%\SYSTEM32\SPOOL\PRINTERS. It is possible for the administrator of a Windows print server to manually instruct Windows the location for
placing the spool files, if for example there is a concern for disk space.

Question No : 5

You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. L2P.com has a server, named L2P-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. You have received instructions to create a virtual machine on L2P-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. Which of the following is TRUE with regards to connecting a physical disk to a virtual machine?

A. The physical disk should not be online.
B. The physical disk should be uninstalled and re-installed.
C. The physical disk should be configured as a striped disk.
D. The physical disk should be configured as a mirrored disk.

Answer: A
Explanation:
Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a "pass-through" disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the HyperV server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyperv.aspx
http://technet.microsoft.com/pt-pt/library/ff404147%28v=ws.10%29.aspx

Question No : 6

Sometimes it's important to remove an RODC from your forest or domain. However, it's important that you follow a simple rule whilst removing RODC's. What is this rule?

A. All RODC's must be detached before removing a final writable domain controller
B. All writable domain controllers must be removed before RODC's can be detached 
C. Your forest must only consist of RODC's if you want to remove them
D. There are no rules for removing RODC's

Answer: A

Question No : 7

You have a server named Server1 that runs Windows Server 2012 R2. You apply a security policy to server1 by using the Security Configuration Wizard (CWM). You plan to roll back the security policy. You need to identify the settings that are prevented from rolling back running the CWM Witch settings should you identify.

A. The secure startup order
B. The outbound authentication methods
C. The network security rules
D. The system access control list (SAClist)

Answer: D
Explanation:

System Keeps Auditing After Rollback In the auditing section of SCW there is an option to include the SCWAudit.inf template. If you do so, SCW configures System Access Control Lists (SACL) on a number of files. Without this template SCW will configure the system to perform object access auditing but since no files have SACLs on them by default, no file access will actually be audited. If you apply a policy with this option turned on and you subsequently roll back the policy the SACLs will remain on the system. Consequently, if the system is configured to perform Object Access Auditing you will find auditing events in the Security Event Log. This is by design. SCW is not designed to roll back ACLs. To clear these SACLs you would need to manually restore any pre- existing SACLs. As long as these were defined in a security template doing so is a simple matter of re-applying that security template.
http://blog.netwrix.com/2015/06/19/configure-audit-policy-and-security-using-securityconfiguration-wizard/


Download 2018 Latest 70-410 Exam Dumps Q&A - 70-410 Questions Dumps PDF


Question No : 8

You have a server named Server1 that Runs Windows Server 2012 R2. You configure IPSec rules for connections to Server1. On Server1, you plan to create an inbound firewall rule that contains the following settings:
- Allows inbound connections to an application named App1.exe
- Applies to the domain profile
- Overrides any block rules
You need to identify the minimum information required to create the rule. Which two pieces of information should you identify? Each correct answer presents part of the solution.

A. the list of Active Directory users who are authorized to use the application.
B. the list of computers that are authorized to use the application.
C. the hash of the application.
D. the local path of the application.
E. the name at the IPSec policies that apply to Server1

Answer: B,D
Explanation:
B: To overwritte deny rule, you need to specify the list of computers.
D: For NAMED application you need local path to the app, in other case you will specify all programs, in answer must be a match.

Question No : 9

Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1. You download several signed Windows PowerShell scripts from the Internet. You need to run the PowerShell scripts on all of the servers and all of the client computers. What should you modify first?

A. the environment variables on all of the servers
B. the environment variables on all client computers
C. the execution policy on all of the servers
D. the execution policy on all of the client computers

Answer: D

Question No : 10

Your network contains an Active Directory domain named contoso.com. You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to prevent the software restriction policy from applying to users that are members of the local Administrators group. What should you do?

A. Modify the rule for App1
B. Modify the Enforcement Properties
C. Modify the Security Levels.
D. Modify the Trusted Publishers Properties

Answer: B
Explanation:
https://technet.microsoft.com/en-us/library/cc776536(v=ws.10).aspx



Buy 70-410 Questions Dumps PDF - 70-410 Exam Dumps Q&A - Realexamdumps.com

No comments:

Post a Comment