getcertified4sure.com

70 410 pdf : Feb 2021 Edition




Act now and download your Microsoft mcsa 70 410 test today! Do not waste time for the worthless Microsoft 70 410 dumps tutorials. Download Down to date Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft microsoft 70 410 exam with a classic professional.

Q61. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1. 

A developer wants to attach a debugger to VM1. 

You need to ensure that the developer can connect to VM1 by using a named pipe. 

Which virtual machine setting should you configure? 

A. BIOS 

B. Network Adapter 

C. COM 1 

D. Processor 

Answer:

Explanation: 

Named pipe. This option connects the virtual serial port to a Windows named pipe on the host operating system or a computer on the network. A named pipe is a portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer). For example, a local named pipe path could be \\.\pipe\mypipename. Named pipes can be used to create a virtual null modem cable between two virtual machines, or between a virtual machine and a debugging program on the host operating system that supports the use of named pipes. By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem cable connection. Named pipes are useful for debugging or for any program that requires a null modem connection. 

Named pipes can be used to connect to a virtual machine by configuring COM 1. 

References: http://support.microsoft.com/kb/819036 http://support.microsoft.com/kb/141709 


Q62. - (Topic 3) 

Catalog Servers. Your domain structure contains one root domain and one child domain. You modify the folder permissions on a file server that is in the child domain. You discover that some Access Control entries start with S-1-5-21 and that no account name is listed. 

You need to list the account names. What should you do? 

A. Move the RID master role in the child domain to a domain controller that holds the Global Catalog. 

B. Modify the schema to enable replication of the friendly names attribute to the Global Catalog. 

C. Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog. 

D. Move the infrastructure master role in the child domain to a domain controller that does not hold the Global Catalog. 

Answer:

Explanation: 

If the IM Flexible Single Master Operation (FSMO) role holder is also a global catalog server, the phantom indexes are never created or updated on that domain controller. (The FSMO is also known as the operations master.) This behavior occurs because a global catalog server contains a partial replica of every object in Active Directory. The IM does not store phantom versions of the foreign objects because it already has a partial replica of the object in the local global catalog. 

For this process to work correctly in a multidomain environment, the infrastructure FSMO role holder cannot be a global catalog server. Be aware that the first domain in the forest holds all five FSMO roles and is also a global catalog. Therefore, you must transfer either role to another computer as soon as another domain controller is installed in the domain if you plan to have multiple domains. 


Q63. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. 

You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. 

Which of the following is TRUE with regards to connecting a physical disk to a virtual machine? 

A. The physical disk should not be online. 

B. The physical disk should be uninstalled and re-installed. 

C. The physical disk should be configured as a striped disk. 

D. The physical disk should be configured as a mirrored disk. 

Answer:

Explanation: 

Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a “pass-through” disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective. 


Q64. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The network contains a domain controller named DC1 that has the DNS Server server role installed. DC1 has a standard primary DNS zone for contoso.com. 

You need to ensure that only client computers in the contoso.com domain will be able to add their records to the contoso.com zone. 

What should you do first? 

A. Sign the contoso.com zone. 

B. Modify the Security settings of DC1. 

C. Modify the Security settings of the contoso.com zone. 

D. Store the contoso.com zone in Active Directory. 

Answer:

Explanation: 

Only Authenticated users can create records when zone is stored in AD. 

Secure dynamic updates allow an administrator to control what computers update what 

names and prevent unauthorized computers from overwriting existing names in DNS. 

References: 

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 6: Network 

Administration, Lesson 2: Implementing DNSSEC, p. 237 

http://technet.microsoft.com/en-us/library/cc731204(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/cc755193.aspx 


Q65. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. 

Contoso.com has a server, named ENSUREPASS-SR15, which has Windows Server 2012 R2 installed. Contoso.com also has a server, named ENSUREPASS-SR16, which has Windows Server 2008 R2 SP1 installed. 

You have been instructed to make sure that ENSUREPASS-SR16 is able to run Windows PowerShell 3.0. 

Which of the following actions should you take? (Choose two.) 

A. You should consider making sure that ENSUREPASS-SR16 has a full installation of Microsoft .NET Framework 4 installed. 

B. You should consider making sure that ENSUREPASS-SR16 has a full installation of Microsoft .NET Framework 2 installed. 

C. You should consider making sure that ENSUREPASS-SR16 has WS-Management 3.0 installed. 

D. You should consider making sure that ENSUREPASS-SR16 is upgraded to Windows Server 2012 R2. 

Answer: A,C 

Explanation: 

WS-Management 3.0 – Windows Management Framework 3.0 Includes Windows PowerShell 3.0, WMI, WinRM, Management OData IIS Extension, and Server Manager CIM Provider 

Windows Management Framework 3.0 requires Microsoft .NET Framework 4.0. 


Q66. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1. 

You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1. 

What should you do? 

A. Run the Delegation of Control Wizard on OU1. 

B. Add User1 to the Group Policy Creator Owners group. 

C. Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder. 

D. Modify the permissions on the User1 account. 

Answer:

Explanation: 

The Delegation of Control Wizard allows you to delegate tasks, active Directory Object types and to set permissions. 


Q67. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the Security Templates snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Authorization Manager 

B. Local Security Policy 

C. Certificate Templates 

D. System Configuration 

Answer:

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 


Q68. - (Topic 3) 

Your network contains two subnets. The subnets are configured as shown in the following table. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1. 

You run the route print command as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that Server1 can communicate with the client computers on LAN2. 

What should you do? 

A. Change the default gateway address. 

B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. 

C. Change the metric of the 10.10.1.0 route. 

D. Set the state of the Teredo interface to disable. 

Answer:

Explanation: 

The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2. 

In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such “last” addresses of a subnet are considered “broadcast” addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so it’s not a very common practice. Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 


Q69. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. 

You install the Windows PowerShell Web Access gateway on Server1. 

You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway. 

Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.) 

A. Set-WSManQuickConfig 

B. Set-WSManInstance 

C. Add-PswaAuthorizationRule 

D. Set-BCAuthentication 

E. Install-PswaWebApplication 

Answer: C,E 

Explanation: 

A. Configures the local computer for remote management. 

B. Modifies the management information that is related to a resource. 

C. Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set. 

D. Specifies the BranchCache computer authentication mode. 

E. Configures the Windows PowerShell . Web Access web Application in IIS. 


Q70. - (Topic 3) 

You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other. 

A. remove the vswitch and recreate it as private. 

B. add new vswitch 

C. remove vswitch and recreate it as public 

D. adjust srv-io settings 

Answer:

Explanation: 

You cannot change the settings of a vswitch with SR-IOV enabled, so you must delete it and recreate it.