getcertified4sure.com

how to use braindumps 70 410




Our pass rate is high to 98.9% and the similarity percentage between our vce 70 410 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft microsoft 70 410 exam in just one try? I am currently studying for the Microsoft 70 410 practice exam exam. Latest Microsoft 70 410 dumps pdf Test exam practice questions and answers, Try Microsoft 70 410 exam questions Brain Dumps First.

Q241. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed. 

You have logged on to a server, named ENSUREPASS-SR07, and would like to obtain the IP configurations of a server, named ENSUREPASS-SR13. 

Which of the following actions should you take? 

A. You should consider making use of the Winrs.exe command. 

B. You should consider making use of the Winsat.exe command. 

C. You should consider making use of the Winpop.exe command. 

D. You should consider making use of the Dsrm.exe command. 

Answer:


Q242. - (Topic 3) 

Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. 

Hyperv1 has a virtual switch named Switch1. 

You replace all of the network adapters on Hyperv1 with new network adapters that support single-root I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Hyperv1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the Switch1 virtual switch. 

C. Delete, and then recreate the Switch1 virtual switch. 

D. On each virtual machine, modify the BIOS settings. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: C,E 


Q243. - (Topic 2) 

You have a server named Server2 that runs Windows Server 2012 R2. 

A network technician installs a new disk on Server2 and creates a new volume. 

The properties of the new volume are shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can enable NTFS disk quotas for volume D. 

What should you do first? 

A. Format volume D 

B. Install the File Server Resource Manager role service 

C. Run the convert.exe command 

D. Convert the disk to a dynamic disk 

Answer:

Explanation: 

To be able to use a NEW disk so that you can enable NTFS disk quotas, in other word REFS to NTFS, it requires formatting first. 


Q244. - (Topic 3) 

You have a virtual machine named VM1. 

You install Windows Server 2012 R2 on VM1. 

You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. 

You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. 

Which tool should you use? 

A. servermanagercmd.exe 

B. dism.exe 

C. ocsetup.exe 

D. imagex.exe 

Answer:

Explanation: 

You can use DISM to: 

Add, remove, and enumerate packages and drivers. 

Enable or disable Windows features. 

Apply changes based on the offline servicing section of an unattend.xml answer file. 

Configure international settings. 

Upgrade a Windows image to a different edition. 

Prepare a Windows PE image. 

Take advantage of better logging. 

Service down-level operating systems like Windows Vista with SP1 and Windows Server 

2008. 

Service all platforms (32-bit, 64-bit, and Itanium). 

Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

Make use of old Package Manager scripts. 

This command will mount the image before making any changes. This will ensure that only 

the required Windows Server 2012 R2 source files are contained. 


Q245. - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. 

On VM5, you install a network monitoring application named Monitor1. 

You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM “VM6 | Set-VMNetworkAdapter-IovWeight 1 

B. Get-VM “VM5 I Set-VMNetworkAdapter -IovWeight 0 

C. Get-VM “VM5 | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM “VM6 | Set-VMNetworkAdapter -AllowTeaming On 

E. Get-VM “VM6 | Set-VMNetworkAdapter -PortMirroring Destination 

F. Get-VM “VM5 | Set-VMNetworkAdapter -AllowTeaming On 

Answer: C,E 

Explanation: 

-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. . If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. . If set to Destination, it receives copied packets from the source virtual network adapter. 

In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source. 

Reference: http://technet.microsoft.com/en-us/library/hh848457.aspx 


Q246. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

You have been instructed to modify the name of the local Administrator account on all Contoso.com workstations. You want to achieve this using as little administrative effort as possible. 

Which of the following actions should you take? 

A. You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC). 

B. You should consider navigating to Local Users and Groups via Computer 

C. You should consider configuring the replication settings. 

D. You should consider navigating to Local Users and Groups via Computer Management on each workstation. 

Answer:

Explanation: 

Rename administrator account policy setting determines whether a different account name is associated with the security identifier (SID) for the Administrator account. Because the Administrator account exists on all Windows server versions, renaming the account makes it slightly more difficult for attackers to guess this user name and password combination. By default, the built-in Administrator account cannot be locked out no matter how many times a malicious user might use a bad password. This makes the Administrator account a popular target for brute-force password-guessing attacks. The value of this countermeasure is lessened because this account has a well-known SID and there are non-Microsoft tools that allow you to initiate a brute-force attack over the network by specifying the SID rather than the account name. This means that even if you have renamed the Administrator account, a malicious user could start a brute-force attack by using the SID. Rename the Administrator account by specifying a value for the Accounts: Rename administrator account policy setting. Location: GPO_name\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options 


Q247. - (Topic 3) 

You have a Hyper-V host named server1 that runs windows server 2012 R2.server1 host 50 virtual machines that run windows server 2012 R2 

You enable and configure enhanced session mode on Server1. 

You need to identify a new functionality available for the virtual machines hosted on server1. 

What should you identify? 

A. Smart card authentication using virtual machine connections 

B. Redirection of RemoteFX USB drivers by using remote desktop connections 

C. Redirection of RemoteFX USB drivers using virtual machine connections 

D. smart card authentication using the remote desktop client. 

Answer:


Q248. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

Hyper-V server role installed. On Server1, you create a virtual machine named VM1. 

You need to ensure that VM1 can start by using PXE. 

What should you do? 

A. Add a second network adapter, and then run the Set-VMNetworkAdaptercmdlet. 

B. Add a second network adapter, and then configure network adapter teaming. 

C. Remove the network adapter, and then run the Set-VMNetworkAdaptercmdlet. 

D. Remove the network adapter, and then add a legacy network adapter. 

Answer:


Q249. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. 

You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. 

Which authentication method should you configure in the connection security rule? 

A. Advanced 

B. User (Kerberos V5) 

C. Default 

D. Computer (Kerberos V5) 

E. Computer and user (Kerberos V5) 

Answer:

Explanation: 

You need to make use of Advanced authentication method to ensure that communication is 

encrypted over the network to the other company from your custom connection security 

rule on Server1. 

References: 

http://technet.microsoft.com/en-us/library/bb742516.aspx 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File 

Services and Storage, p. 428 


Q250. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

You attach four 500-GB disks to Server1. 

You need to configure the storage to meet the following requirements: 

. Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. . Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. . The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. . The storage must be available if a single disk fails. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From File and Storage Services, create virtual disks by using fixed provisioning. 

B. From File and Storage Services, create virtual disks by using thin provisioning. 

C. From File and Storage Services, create a storage pool that uses all four disks. 

D. From Disk Management, create a new RAID-5 volume that uses all four disks. 

E. From Disk Management, create two new mirror volumes that use two disks each. 

Answer: A,C