we provide Best Quality Microsoft 70 410 study guide pdf exam prep which are the best for clearing 70 410 exam dumps test, and to get certified by Microsoft Installing and Configuring Windows Server 2012. The exam collections 70 410 Questions & Answers covers all the knowledge points of the real mcsa 70 410 pdf exam. Crack your Microsoft 70 410 pdf Exam with latest dumps, guaranteed!
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-410-exam-dumps.html
Q231. - (Topic 1)
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 has the virtual switches listed in the following table.
You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
A. Run the Set-VmNetworkAdaptercmdlet.
B. Add a new network adapter to VM1.
C. Create a new virtual switch on Server 1.
D. Modify the properties of vSwitch1 and vSwitch2.
Answer: A
Q232. - (Topic 3)
A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems.
Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports?
A. 2003 R2
B. 2008
C. 2003
D. 2012
Answer: B,D
Explanation:
Windows Server 2008, 2008 R2, and 2012 R2 can be guest operating systems when using
Hyper-V Fibre Channel host bus adaptors (HBAs). Updated HBA drivers are needed along
with NPIV-enabled (N_Port ID Virtualization) SANs.
Quick Tip: Virtual Fibre Channel logical units cannot be used as boot media.
Q233. HOTSPOT - (Topic 1)
You have a DHCP server named Server1 that runs Windows Server 2012 R2. On Server1, you run the commands as shown in the exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
Answer:
Q234. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed.
Contoso.com has a server, named ENSUREPASS-SR15, which is configured as a file server.
You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ENSUREPASS-SR15 via Windows Server Backup.
Which of the following actions should you take?
A. You should consider making use of Computer Management to configure the local groups.
B. You should consider making use of Computer Management to configure the domain local groups.
C. You should consider making use of Computer Management to configure the global groups.
D. You should consider making use of Computer Management to configure the administrator groups.
Answer: D
Explanation:
To perform backups or recoveries by using Windows Server Backup, you must be a
member of the Administrators or Backup Operators groups.
You can only use Backup locally; you cannot backup a remote computer.
You can only back up and restore System State data on a local computer. You cannot back
up and restore System State data on a remote computer even if you are an administrator
on the remote computer.
Q235. HOTSPOT - (Topic 1)
Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008 R2 or Windows Server 2012 R2. All client computers run Windows 8.
All computer accounts are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) that contains several AppLocker rules. You link
the GPO to OU1.
You need to ensure that the AppLocker rules apply to all of the client computers.
What should you configure in the GPO?
To answer, select the appropriate service in the answer area.
Answer:
Q236. - (Topic 1)
Your company has a main office and two branch offices. The offices connect to each other by using a WAN link.
In the main office, you have a server named Server1 that runs Windows Server 2012 R2.
Server1 is configured to use an IPv4 address only.
You need to assign an IPv6 address to Server1. The IP address must be private and routable.
Which IPv6 address should you assign to Server1?
A. fe80:ab32:145c::32cc:401b
B. ff00:3fff:65df:145c:dca8::82a4
C. 2001:ab32:145c::32cc:401b
D. fd00:ab32:14:ad88:ac:58:abc2:4
Answer: D
Explanation:
Unique local addresses are IPv6 addresses that are private to an organization in the same way that private addresses–such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 172.31.255.255–can be used on an IPv4 network. Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like 10.20.100.55 is not routable on the IPv4 Internet. A unique local address is always structured as follows: The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD and has a prefix identifier of FD00::/8.
Q237. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
A. Interface types
B. Authorized computers
C. Remote IP address
D. Edge traversal
Answer: D
Explanation:
Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device.
Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device.
: http://technet.microsoft.com/en-us/library/cc731927.aspx
Q238. - (Topic 3)
Your network contains two subnets. The subnets are configured as shown in the following table.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Server1 can communicate with the client computers on LAN2.
What should you do?
A. Change the default gateway address.
B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable.
C. Change the metric of the 10.10.1.0 route.
D. Set the state of the Teredo interface to disable.
Answer: A
Explanation:
The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2.
In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such “last” addresses of a subnet are considered “broadcast” addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so it’s not a very common practice. Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address.
References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256
Q239. - (Topic 2)
You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2.
Corel has the Hyper-V server role installed. Corel has two network adapters from different third-party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.
What should you use?
A. New-NetSwitchTeam
B. Install-Feature
C. Add-NetSwitchTeamMember
D. Netsh.exe
Answer: A
Q240. - (Topic 1)
Your network contains a server named Server1 that runs Windows Server 2012
R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.
What should you configure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: B
Explanation:
B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines.
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335