The only windows server 2012 mcsa resources for you

Cause all that matters here is passing the Microsoft 70-410 exam. Cause all that you need is a high score of 70-410 Installing and Configuring Windows Server 2012 exam. The only one thing you need to do is downloading Pass4sure 70-410 exam study guides now. We will not let you down with our money-back guarantee.

2016 Oct mcsa 70-410:

Q196. HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

Several users are members of the local Administrators group. 

You need to ensure that all local administrators receive User Account Control (UAC) 

prompts when they run a Microsoft Management Console (MMC). 

Which settings should you modify from the Local Security Policy? To answer, select the 

appropriate settings in the answer area. 

Answer: 


Q197. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. 

You need to create a 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. Computer Management 

B. Server Manager 

C. Share and Storage Management 

D. New-VirtualDisk 

Answer:

Explanation: 

For other questions to create a VHD (file) you can use computer management. 

-Share and storage management (2008 only) 

-New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk) 

-Server Manager (you would use this to create virtual disks, not virtual hard disks) 


Q198. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012 R2. 

An administrator creates a security template named Template1. 

You need to apply Template1 to Server1. 

Which snap-in should you use? 

A. Resultant Set of Policy 

B. Security Configuration and Analysis 

C. Authorization Manager 

D. Security Templates 

Answer:

Explanation: 

The Security Configuration and Analysis tool contains the Local Security Policy snap-in that is used to apply templates. 

References: 

http://technet.microsoft.com/en-us/library/bb742512.aspx http://technet.microsoft.com/en-us/library/cc739442%28v=WS.10%29.aspx 


Q199. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

VM2 sends and receives large amounts of data over the network. 

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic. 

References: 

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx 

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 


Q200. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Enable single-root I/O visualization (SR-IOV) on Server1. 

C. Disable the DHCP guard on Server1. 

D. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

Answer:

Explanation: 

DHCP guard setting 

This setting stops the virtual machine from making DHCP offers over this network interface. 

To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use 

DHCP to acquire an IP address that will work) it only blocks the ability for the virtual 

machine to act as a DHCP server. 


Q201. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and has the Hyper-V server role installed. HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server 1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

C. Disable the DHCP guard on Server1. 

D. Enable single-root I/O virtualization (SR-IOV) on Server1. 

Answer:

Explanation: 

Private virtual networks are used where you want to allow communications between virtual machine to virtual machine on the same physical server in a block diagram, a private network is an internal network without a virtual NIC in the parent partition. A private network would commonly be used where you need complete isolation of virtual machines from external and parent partition traffic. DMZ workloads running on a leg of a trihomed firewall, or an isolated test domain are examples where this type of network may be useful. 


Q202. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named 0U1. You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1. 

What should you do? 

A. Modify the permissions on OU1. 

B. Run the Set-GPPermission cmdlet. 

C. Add User1 to the Group Policy Creator Owners group. 

D. Modify the permissions on the User1 account. 

Answer:

Explanation: 


Renovate 70-410 installing and configuring windows server 2012 r2 pdf:

Q203. HOTSPOT - (Topic 3) 

You run a Windows 2012 and implementing 3 new printers in a warehouse. You need to makean exclusion forthese IP addresses within DHCP server. 

Select the location where would configure at the DHCP console? 

Answer: 


Q204. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You have fixed-size VHD named Files.vhd. 

You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements: 

. Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines. . Minimize the amount of disk space used. 

What should you do? 

A. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file. 

B. Convert Files.vhd to a dynamically expanding VHD? 

C. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file. 

D. Create differencing VHDs that use Files.vhd as the parent disk. 

Answer:

Explanation: 

A. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s 

B. Single VHD not available to multiple VM’s. Changes wouldn’t be reflected 

C. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s 

D. Child disk for multiple VM’s with Files.vhd as parent. A differencing disk is associated with another virtual hard disk that you select when you create the differencing disk. This means that the disk to which you want to associate the differencing disk must exist first. This virtual hard disk is called the “parent” disk and the differencing disk is the “child” disk. The parent disk can be any type of virtual hard disk. The differencing disk stores all changes that would otherwise be made to the parent disk if the differencing disk was not being used. The differencing disk provides an ongoing way to save changes without altering the parent disk. You can use the differencing disk to store changes indefinitely, as long as there is enough space on the physical disk where the differencing disk is stored. The differencing disk expands dynamically as data is written to it and can grow as large as the maximum size allocated for the parent disk when the parent disk was created. 


Q205. - (Topic 3) 

On Server1, you plan to create an inbound firewall rule that contains the following settings: 

Allows inbound connections to an application named App1.exe 

Applies to the domain profile 

Overrides any block rules 

You need to identify the minimum information required to create the rule. 

Which two pieces of information should you identify? Each correct answer presents part of the solution. 

A. the list of computers that are authorized to use the application 

B. the list of Active Directory users who are authorized to use the application 

C. the hash of the application 

D. the name of the IPSec policies that apply to Server1 

E. the local path of the application 

Answer: A,E 


Q206. HOTSPOT - (Topic 3) 

You have a Server Core 2012 installation and all roles and features removed. The server does not haveaccess to Windows Update. You mount the network volume containing the installation files for Server 2012. 

You need to install DNS and DHCP server role. 

Which directory do you reference for installing? 

Answer: 


Q207. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). 

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. 

Which virtual machine setting should you configure for VM2? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. 

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 


Q208. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to enable Hyper-V Network Virtualization on Server1. 

You need to install the Windows Network Visualization Filter Driver on Server1. 

Which Windows PowerShell cmdlet should you run? 

A. Set-NetVirtualizationGlobal 

B. Enable-NetAdapterBinding 

C. Add - WindowsFeature 

D. Set-NetAdapterVmq 

Answer:

Explanation: 

Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each virtual network operates as if it is running as a physical network. The Set-NetAdaptercmdlet sets the basic properties of a network adapter such as virtual LAN (VLAN) identifier (ID) and MAC address. Thus if you add the binding parameter to the command then you will be able to install the Windows Network Virtualization Filter Driver. Step one: Enable Windows Network Virtualization (WNV). This is a binding that is applied to the NIC that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO NIC team. Either way, it is the network adapter that your External Virtual Switch uses to exit the server. This also means that if you have multiple virtual networks or multiple interfaces that you can pick and choose and it is not some global setting. If you have one External Virtual Switch this is fairly easy: $vSwitch = Get-VMSwitch -SwitchType External # Check if Network Virtualization is bound # This could be done by checking for the binding and seeing if it is enabled ForEach-Object -InputObject $vSwitch { if ((Get-NetAdapterBinding -ComponentID "ms_netwnv" -InterfaceDescription $_.NetAdapterInterfaceDescription).Enabled -eq $false){ # Lets enable it Enable-NetAdapterBinding -InterfaceDescription $_.NetAdapterInterfaceDescription -ComponentID "ms_netwnv"}} 


Q209. - (Topic 3) 

You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server. 

You need to ensure that client computers can establish PPTP connections to Server1. 

Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.) 

A. An inbound rule for protocol 47 

B. An outbound rule for protocol 47 

C. An inbound rule for TCP port 1723 

D. An inbound rule for TCP port 1701 

E. An outbound rule for TCP port 1723 

F. An outbound rule for TCP port 1701 

Answer: A,C 

Explanation: 

The following is a list of firewall ports which need to be opened for the various VPN tunnel 

protocols: 

For PPTP: 

IP Protocol=TCP, TCP Port number=1723 <- Used by PPTP control path 

IP Protocol=GRE (value 47) <- Used by PPTP data path 

For L2TP: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 

For SSTP: 

IP Protocol=TCP, TCP Port number=443 <- Used by SSTP control and data path 

For IKEv2: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 


Q210. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

Your company hires 500 temporary employees for the summer. 

The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. 

You need to automate the creation of user accounts for the 500 temporary employees. 

Which tool should you use? 

A. ADSI Edit 

B. The csvde.exe command 

C. Active Directory Users and Computers 

D. The Add-Member cmdlet 

Answer:

Explanation: 

Csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

The CSVDE is a command-line utility that can create new AD DS objects by importing 

information from a comma-separated value (.csv) file. This would be the least amount of 

administrative effort in this case especially considering that these would be temporary 

employees. 



see more 70-410 dumps