Ideas to mcsa 70 410

Cause all that matters here is passing the Microsoft 70 410 questions exam. Cause all that you need is a high score of 70 410 questions Installing and Configuring Windows Server 2012 exam. The only one thing you need to do is downloading Examcollection 70 410 exam dumps exam study guides now. We will not let you down with our money-back guarantee.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q171. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of an Active Directory forest that contains a root domain, named Contoso.com, and two child domains, named us.Contoso.com and uk.Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

The root domain hosts a domain local distribution group, named ENSUREPASSGroup. You are preparing to issue ENSUREPASSGroup read-only access to a shared folder hosted by the us.Contoso.com domain. 

You want to make sure that ENSUREPASSGroup is able to access the shared folder in the us.Contoso.com domain. 

Which of the following actions should you take? 

A. You should consider re-configuring ENSUREPASSGroup as a universal Admins group. 

B. You should consider re-configuring ENSUREPASSGroup as a universal security group. 

C. You should consider re-configuring ENSUREPASSGroup as a global administrators group. 

D. You should consider re-configuring ENSUREPASSGroup as a local administrators group. 

Answer:


Q172. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing Group Policy preference. 

Which of the following is TRUE with regards to Group Policy preference? 

A. It supports applications and operating system features that are not compatible with Group Policy 

B. It does not support item-level targeting. 

C. It is the same as Group Policy filtering. 

D. It does not cause the application or operating system feature to disable the user interface for the settings they configure. 

Answer: A,D 


Q173. - (Topic 3) 

Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. 

Hyperv1 has a virtual switch named Switch1. 

You replace all of the network adapters on Hyperv1 with new network adapters that support single-root I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Hyperv1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the Switch1 virtual switch. 

C. Delete, and then recreate the Switch1 virtual switch. 

D. On each virtual machine, modify the BIOS settings. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: C,E 


Q174. HOTSPOT - (Topic 2) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. 

A user named User1 is a member of Group1 and Group2. A user named User2 is a 

member of Group2 and Group3. 

You need to identify which actions the users can perform when they access the files in 

Share1. 

What should you identify? 

To answer, select the appropriate actions for each user in the answer area. 

Answer: 


Q175. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. 

All servers are configured to enforce AppLocker policies. 

You install a server named Server1. 

On Server1, you install an application named App1.exe in a folder located on C:\App1. 

You have two domain groups named Group1 and Group2.A user named User1 is a 

member of Group1 and Group2. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com. 

You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q176. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table. 

You have a virtual machine named VM1. 

You need to configure VM1 to connect to SAN1. 

What should you do first? 

A. Add one HBA 

B. Create a Virtual Fibre Channel SAN. 

C. Create a Hyper-V virtual switch. 

D. Configure network adapter teaming. 

Answer:

Explanation: 

You need your virtualized workloads to connect easily and reliably to your existing storage 

arrays. 

Windows Server 2012 provides Fibre Channel ports within the guest operating system, 

which allows you to connect to Fibre Channel directly from within virtual machines. This 

feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure. With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads. Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO. 


Q177. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Hyperv1 and a domain controller named DC1. Hyperv1 has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1. 

Users report that the time on their client computer is incorrect. 

You log on to DC1 and verify that the time services are configured correctly. 

You need to prevent time conflicts between the time provided by DC1 and other potential 

time sources. 

What should you configure? 

To answer, select the appropriate object in the answer area. 

Answer: 


Q178. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. 

You need to ensure that users can recover files that they accidently delete from Documents. 

What should you do? 

A. Enable shadow copies by using Computer Management. 

B. Create a storage pool that contains a two-way mirrored volume by using Server Manager. 

C. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console. 

D. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK). 

Answer:

Explanation: 

If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot select specific shared folders and files on a volume to be copied or not copied. 

To enable and configure Shadow Copies of Shared Folders: 

1. Click Start, point to Administrative Tools, and then click Computer Management. 

2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies. 

3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable. 

4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings. 

5. To make changes to the default schedule and storage area, click Settings. 

Shadow copies - a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 

7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302 


Q179. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q180. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Web Server (US) server role installed. 

Server1 has a web site named Web1. Web1 is configured to use digest authentication. 

You need to ensure that a user named User1 can access Web1. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of User1, select Use Kerberos DES encryption types for this account. 

C. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

D. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

Answer:

Explanation: 

Challenge Handshake Authentication Protocol (CHAP) is a basic level of iSCSI security that is used to authenticate the peer of a connection and is based upon the peers sharing a secret: that secret being a password. To make sure that User1 can connect to the server, you should use Active Directory Users and Computers to store that password.