getcertified4sure.com

70 410 exam dumps (1 to 10)




Exam Code: 70 410 dumps pdf (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Installing and Configuring Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass braindumps 70 410 Exam.

Q1. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing Storage Spaces. 

Which of the following is TRUE with regards to Storage Spaces? 

A. Mirroring and parity are optional resilient storage modes of Storage Spaces. 

B. Failover clustering is not supported by Storage Spaces. 

C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

Answer: A,C 


Q2. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You reconfigure DC2 as a member server in the domain. 

You need to add DC2 as the first domain controller in a new domain in the forest. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install WindowsFeature 

D. Install AddsDomain 

E. Rename-AdObject 

F. Set AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

Since a member server does not have Active Directory Domain Services installed, you must install this role before you can configure the new Domain Controller (which would require you to run Install-ADDSForest). 

Topic 2, Volume B 


Q3. - (Topic 1) 

Your network contains multiple subnets. 

On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. 

You need to ensure that client computers can resolve single-label names to IP addresses. 

What should you do first? 

A. Create a reverse lookup zone. 

B. Convert the contoso.com zone to an Active Directory-integrated zone. 

C. Configure dynamic updates for contoso.com. 

D. Create a GlobalNames zone. 

Answer:

Explanation: 

Although a GlobalNames zone is required in order to resolve single-label names, GNZs 

must be AD-integrated. 

Since this is a standard primary zone (as opposed to an ADDS primary zone), we must first 

integrate the zone into Active Directory. 

References: 

Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: 

Deploying and configuring core network services, Objective 4.3: Deploy and Configure the 

DNS service, p.233 

http://technet.microsoft.com/en-us/library/cc731744.aspx 


Q4. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, you create a virtual machine named VM1. 

When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as shown in the following exhibit. (Click the Exhibit button.) 

You need to add the RemoteFX 3D Video Adapter to VM1. 

What should you do first? 

A. On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet 

B. On Server1, install the Media Foundation feature. 

C. On Server1, run the Enable-VMRemoteFxPhysicalVideoAdaptercmdlet. 

D. On Server1, install the Remote Desktop Visualization Host (RD Visualization Host) role service. 

Answer:

Explanation: 

Remote Desktop services are not available in server core installation; you need to add the 

role. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: 

Installing and Configuring servers, Objective 1.2: 

Configure servers, p. 19 

http://technet.microsoft.com/en-us/library/hh848506(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848520(v=wps.620).aspx http://technet.microsoft.com/en-us/library/ff817586(v=ws.10).aspx 


Q5. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 has a virtual switch named RDS Virtual. 

You replace all of the network adapters on Server1 with new network adapters that support single-root I/O visualization (SR-IOV). 

You need to enable SR-IOV for all of the virtual machines on Server1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the RDS Virtual virtual switch. 

C. On each virtual machine, modify the BIOS settings. 

D. Delete, and then recreate the RDS Virtual virtual switch. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: D,E 

Explanation: 

The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. It is not possible to change a “non SR-IOV mode” external virtual switch into an “SR-IOV mode” switch. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it. 

E: Once a virtual switch has been created, the next step is to configure a virtual machine. 

SR-IOV in Windows Server “8” is supported on x64 editions of Windows “8” as a guest operating system (as in Windows “8” Server, and Windows “8” client x64, but not x86 client).We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. At the bottom is a checkbox to enable SR-IOV. 


Q6. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. 

You need to create a network adapter team from the three network adapters connected to LAN1. 

Which tool should you use? 

A. Routing and Remote Access 

B. Network and Sharing Center 

C. Server Manager 

D. Network Load Balancing Manager 

Answer:


Q7. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q8. - (Topic 3) 

A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice. 

The server team would like four of the servers to include the Windows 8 Shell. 

Which installation option is required for these servers? 

A. Server Core 

B. Desktop Experience 

C. Server with a GUI 

D. Minimal Server Interface 

Answer:

Explanation: 

The Desktop Experience installation option includes the Windows 8 Shell feature. This installation option also includes other features available for installation not found in the other three; such as Themes, Windows Store and support for Windows Store apps, and Windows Media Player. Quick Tip: To completely remove a feature and the binary files from the disk, use the Windows PowerShell command Uninstall-WindowsFeature. For example, to remove Desktop Experience: Uninstall-WindowsFeature Desktop-Experience –Remove. 


Q9. - (Topic 3) 

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd. 

Which PowerShell cmdlet option you should run first? 

A. Dismount-VHD 

B. Mount-VHD 

C. Resize-VHD 

D. Convert-VHD 

Answer:


Q10. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table. 

You have a virtual machine named VM1. 

You need to configure VM1 to connect to SAN1. 

What should you do first? 

A. Add one HBA 

B. Create a Virtual Fibre Channel SAN. 

C. Create a Hyper-V virtual switch. 

D. Configure network adapter teaming. 

Answer:

Explanation: 

You need your virtualized workloads to connect easily and reliably to your existing storage 

arrays. 

Windows Server 2012 provides Fibre Channel ports within the guest operating system, 

which allows you to connect to Fibre Channel directly from within virtual machines. This 

feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure. With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads. Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.