getcertified4sure.com

Questions Ask for 70 410 installing and configuring windows server 2012 pdf




It is more faster and easier to pass the Microsoft 70 410 exam dumps exam by using Guaranteed Microsoft Installing and Configuring Windows Server 2012 questuins and answers. Immediate access to the Most up-to-date 70 410 dumps pdf Exam and find the same core area exam 70 410 pdf questions with professionally verified answers, then PASS your exam with a high score now.

Q231. - (Topic 1) 

You have a server named Server1. Server1 runs Windows Server 2012 R2. 

Server1 has a thin provisioned disk named Disk1. 

You need to expand Disk1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From File and Storage Services, extend Disk1. 

B. From File and Storage Services, add a physical disk to the storage pool. 

C. From Disk Management, extend the volume. 

D. From Disk Management, delete the volume, create a new volume, and then format the volume. 

E. From File and Storage Services, detach Disk1. 

Answer: A,B 

Explanation: 

Step 1 (B): if required add physical disk capacity. 

Step 2 (A): Dynamically extend the virtual disk (not volume). 

The File and Storage Services role and the Storage Services role service are installed by 

default, but without any additional role services. This basic functionality enables you to use 

Server Manager or Windows PowerShell to manage the storage functionality of your 

servers. 

Windows Server 2012 Storage Space subsystem now virtualizes storage by abstracting 

multiple physical disks into a logical construct with specified capacity. 

The process is to group selected physical disks into a container, the so-called storage pool, 

such that the total capacity collectively presented by those associated physical disks can 

appear and become manageable as a single and seemingly continuous space. 

Subsequently storage administrator creates a virtual disk based on a storage pool, 

configure a storage layout which is essentially a RAID level, and expose the storage of the 

virtual disk as a drive letter or a mapped folder in Windows Explorer. 

The system administrator uses File and Storage Services in Server Manager or the Disk 

Management tool tore scan the disk, bring the disk online, and extend the disk size. 


Q232. DRAG DROP - (Topic 3) 

You have a Hyper-V host named Server1. A technician creates a virtual machine named 

VM1 on Server1 by using the New Virtual Machine Wizard. 

You start VM1 and you discover that there is no option to start by using PXE. 

You need to ensure that you can start VM1 by using PXE. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

three actions from the list of actions to the answer area and arrange them in the correct 

order.) 

Answer: 


Q233. - (Topic 3) 

You have an existing Active Directory site named Site1. You create a new Active Directory site and name it Site2. You need to configure Active Directory replication between Site1 and Site2. You install a new domain controller. 

You create the site link between Site1 and Site2. 

What should you do next? 

A. Use the Active Directory Sites and Services console to configure a new site link bridge object. 

B. Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2. 

C. Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new domain controller object to Site2. 

D. Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehead server for Site1. 

Answer:

Explanation: 

Inter-site Replication 

The process of creating a custom site link has five basic steps: 

1. Create the site link. 

2. Configure the site link’s associated attributes. 

3. Create site link bridges. 

4. Configure connection objects. (This step is optional.) 

5. Designate a preferred bridgehead server. (This step is optional) 


Q234. - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. 

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. 

What should you do? 

A. Change the scope of Group1 to domain local. 

B. Modify the Allowed to Authenticate permissions in adatum.com. 

C. Enable SID quarantine on the trust between contoso.com and adatum.com. 

D. Modify the Allowed to Authenticate permissions in contoso.com. 

Answer:

Explanation: 

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access. 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. 


Q235. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to create a storage pool that will contain a new volume. 

You need to create a new 600-GB volume by using thin provisioning. The new volume must use the parity layout. 

What is the minimum number of 256-GB disks required for the storage pool? 

A. 2 

B. 3 

C. 4 

D. 5 

Answer:

Explanation: 

It takes 3 discs (minimum) in order to create a storage pool array with parity. If this array were using fixed provisioning, this would not be enough given the 256MB capacity (since only 2/3rds of 256 X 3 - less than 600 - could be used as actual data with the rest being parity bits), but since this array uses thin provisioning, a 600GB volume could technically be set up on a 20GB disc and it would still show as 600GB. (So, essentially, the question really becomes how many drives it takes in a storage pool to create a parity array.) 

References: 

http://technet.microsoft.com/en-us/library/hh831391.aspx http://www.ibeast.com/content/tools/RaidCalc/RaidCalc.asp 

http://www.raid-calculator.com/default.aspx https://www.icc-usa.com/raid-calculator 


Q236. HOTSPOT - (Topic 3) 

Your network contains a domain controller named dc5.adatum.com that runs Windows 

Server 2012 R2. 

You discover that you can connect successfully to DC5 over the network, but you receive a 

request timed out message when you attempt to ping DC5. 

You need to configure DC5 to respond to ping request. 

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in 

the answer area. 

Answer: 


Q237. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? 

A. From a command prompt, run sc.exe and specify the config parameter. 

B. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter 

C. From Windows PowerShell,run Set-Service and specify the -StartupType parameter 

D. From Services Console configure the General settings 

Answer:


Q238. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Serve 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. 

You need to ensure that users can use Previous Versions to restore the files in Share1. 

What should you configure on Server1? 

A. The Shadow Copies settings 

B. A Windows Server Backup schedule 

C. A data recovery agent 

D. The Recycle Bin properties 

Answer:

Explanation: 

A. Enable and schedule shadow copies for Share1 

B. The backup doesn’t give users access until files are restored 

D. No settings for file version 


Q239. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

All servers run Windows Server 2012 R2. 

An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed. 

You need to ensure that only the latest version of Appl.exe can run on the client computers. 

What should you create? 

A. An application control policy packaged app rule 

B. A software restriction policy certificate rule 

C. An application control policy Windows Installer rule 

D. An application control policy executable rule 

Answer:

Explanation: 

A. A publisher rule for a Packaged app is based on publisher, name and version B. You can create a certificate rule that identifies software and then allows or does not allow the software torun, depending on the security level. 

C. For .msi or .msp 

D. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if digital certificates are processed when a user or process attempts to run software with an .exe file name extension. This security settings is used to enable or disable certificate rules, a type of software restriction policies rule. With software restriction policies, you can create a certificate rule that will allow or disallow software that is signed by Authenticode to run, based on the digital certificate that is associated with the software. In order for certificate rules to take effect, you must enable this security setting. When certificate rules are enabled, software restriction policies will check a certificate revocation list (CRL) to make sure the software’s certificate and signature are valid. This may decrease performance when start signed programs. You can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes. 


Q240. HOTSPOT - (Topic 3) 

Your network contains a server named Server1 that runs Windows Server 2012 R2. App1 

has the Print and Document Services server role installed. 

All client computers run Windows 8. 

The network contains a network-attached print device named Printer1. 

From App1, you share Printer1. 

You need to ensure that users who have connected to Printer1 previously can print to 

Printer1 if App1 fails. 

What should you configure? To answer, select the appropriate option in the answer area. 

Answer: