Microsoft 70-410 ExamInstalling and Configuring Windows Server 2012

Total Question: 505 Last Updated: Oct 11,2018
  • Updated 70-410 Dumps
  • Based on Real 70-410 Exams Scenarios
  • Free 70-410 pdf Demo Available
  • Check out our 70-410 Dumps in a new PDF format
  • Instant 70-410 download
  • Guarantee 70-410 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

[Improve] 70 410 dumps

Proper study guides for Leading Microsoft Installing and Configuring Windows Server 2012 certified begins with Microsoft 70 410 exam questions preparation products which designed to deliver the Free microsoft 70 410 exam questions by making you pass the microsoft 70 410 test at your first time. Try the free examcollection 70 410 demo right now.

P.S. Free 70-410 preparation labs are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Tx7a0Kv4S8BSp9VK9XVHC-fWKOkcNnJK


New Microsoft 70-410 Exam Dumps Collection (Question 12 - Question 18)

Question No: 12

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You install a network monitoring application on VM2.

You need to ensure that all of the traffic sent to VM3 can be captured on VM2. What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: J

Explanation:

With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. And since Port mirroring allows the network traffic of a virtual machine to be monitored by copying the traffic and forwarding it to another virtual machine that is configured for monitoring, you should configure port mirroring on VM2.

Reference: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror


Question No: 13

Your network contains an Active Directory forest that contains three domains.

A group named Group1 is configured as a domain local distribution group in the forest root domain.

You plan to grant Group1 read-only access to a shared folder named Share1.Share1 is located in a child domain.

You need to ensure that the members of Group1 can access Share1. What should you do first?

A. Convert Group1 to a universal security group.

B. Convert Group1 to a global distribution group.

C. Convert Group1 to a universal distribution group.

D. Convert Group1 to a domain local security group.

Answer: A

Explanation:

Universal can be used for any domain or forest. Furthermore a Universal group can span multiple domains, even the entire forest.

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install and Administer Active Directory, Objective 5.3 Create and manage Active Directory groups and Organization units, p. 289-291, 293

http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx


Question No: 14

You have a server that runs a Server Core installation of Windows Server 2012 R2. You need to change the DNS server used by IPv6.

What should you do?

A. From Sconfig, configure the Network Settings.

B. Run the sc.exe command and specify the config parameter.

C. From Windows PowerShell, run the Set-NetIpv6Protocol cmdlet.

D. From Windows PowerShell, run the Set-DnsClientServerAddress cmdlet.

Answer: D

Explanation:

The Set-DnsClientServerAddresscmdlet sets one or more IP addresses for DNS servers associated with an interface. This cmdlet statically adds DNS server addresses to the interface. If this cmdlet is used to add DNS servers to the interface, then the DNS servers will override any DHCP configuration for that interface.

PS C:\> Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses "10.0.0.1","10.0.0.2")

References:

http://technet.microsoft.com/en-us/library/jj592692.aspx http://technet.microsoft.com/en-us/library/jj590768.aspx


Question No: 15

You have a server named Server1 that runs Windows Server 2012 R2.

You add an additional disk to Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that users can access the additional disk from drive C. What should you do?

A. Convert Disk 0 to a dynamic disk and add a mirror.

B. Create a simple volume on Disk 1 and mount the volume to a folder.

C. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.

D. Convert Disk 1 to a dynamic disk and create a spanned volume.

Answer: B


Question No: 16

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.

What should you configure?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: B

Explanation:

:B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines.

References:

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335


Question No: 17

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. Client computers run either Windows 7 or Windows 8.

All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of the client computers use a DNS server named Server1.

You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the contoso.com DNS zone.

You need to ensure that the client computers locate the ISATAP router. What should you do?

A. Run the Set-DnsServerGlobalQueryBlockList cmdlet on Server1.

B. Configure the Network Options Group Policy preference of GPO1.

C. Run the Add-DnsServerResourceRecord cmdlet on Server1.

D. Configure the DNS Client Group Policy setting of GPO1.

Answer: A

Explanation:

The Set-DnsServerGlobalQueryBlockList command will change the settings of a global query block list which you can use to ensure that client computers locate the ISATAP router.

Windows Server 2008 introduced a new feature, called u201cGlobal Query Block listu201d, which prevents some arbitrary machine from registering the DNS name of WPAD. This is a good security feature, as it prevents someone from just joining your network, and setting himself up as a proxy. The dynamic update feature of Domain Name System (DNS) makes it possible for DNS client computers to register and dynamically update their resource records with a DNS server whenever a client changes its network address or host name. This reduces the need for manual administration of zone records. This convenience comes at a cost, however, because any authorized client can register any unused host name, even a host name that might have special significance for certain Applications. This can allow a malicious user to take over a special name and divert certain types of network traffic to that useru2019s computer. Two commonly deployed protocols are particularly vulnerable to this type of takeover: the Web Proxy Automatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel Addressing Protocol (ISATAP). Even if a network does not deploy these protocols, clients that are configured to use them are vulnerable to the takeover that DNS dynamic update enables. Most commonly, ISATAP hosts construct their PRLs by using DNS to locate a host named isatap on the local domain. For example, if the local domain is corp.contoso.com, an ISATAP-enabled host queries DNS to obtain the IPv4 address of a host named isatap.corp.contoso.com. In its default configuration, the Windows Server 2008 DNS Server service maintains a list of names that, in effect, it ignores when it receives a query to resolve the name in any zone for which the server is authoritative. Consequently, a malicious user can spoof an ISATAP router in much the same way as a malicious user can spoof a WPAD server: A malicious user can use dynamic update to register the useru2019s own computer as a counterfeit ISATAP router and then divert traffic between ISATAP-enabled computers on the network. The initial contents of the blocktypes of resource records. Use different switches for different record types. By using this cmdlet, you can list depend on whether WPAD or ISATAP is already deployed when you add the DNS server role to an existing Windows Server 2008 deployment or when you upgrade an earlier version of Windows Server running the DNS Server service. Add- DnsServerResourceRecord u2013 The Add-DnsServerResourceRecordcmdlet adds a resource record for a Domain Name System (DNS) zone on a DNS server. You can add different change a value for a record, configure whether a record has a time stamp, whether any authenticated user can update a record with the same owner name, and change lookup timeout values, Windows Internet Name Service (WINS) cache settings, and replication settings. Set-DnsServerGlobalQueryBlockList u2013 The Set- DnsServerGlobalQueryBlockListcmdlet changes settings of a global query block list on a Domain Name System (DNS) server. This cmdlet replaces all names in the list of names that the DNS server does not resolve with the names that you specify. If you need the DNS server to resolve names such as ISATAP and WPAD, remove these names from the list. Web Proxy Automatic Discovery Protocol (WPAD) and Intra-site Automatic Tunnel Addressing Protocol (ISATAP) are two commonly deployed protocols that are particularly vulnerable to hijacking.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649874.aspx

http://technet.microsoft.com/en-us/library/jj649909.aspx


Question No: 18

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

VM2 sends and receives large amounts of data over the network.

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.

What should you configure?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: K

Explanation:

Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic.

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335


Recommend!! Get the Free 70-410 dumps in VCE and PDF From Surepassexam, Welcome to download: https://www.surepassexam.com/70-410-exam-dumps.html (New 496 Q&As Version)


Related 70-410 Articles