It is more faster and easier to pass the Microsoft 70 410 dumps exam by using Simulation Microsoft Installing and Configuring Windows Server 2012 questuins and answers. Immediate access to the Up to the minute vce 70 410 Exam and find the same core area 70 410 installing and configuring windows server 2012 pdf questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q251. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. You attach four 500-GB disks to Server1. You need to configure the storage to meet the following requirements: 

. Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. . Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. . The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. . The storage must be available if a single disk fails. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From File and Storage Services, create virtual disks by using fixed provisioning. 

B. From File and Storage Services, create a storage pool that uses all four disks. 

C. From Disk Management, create two new mirror volumes that use two disks each. 

D. From Disk Management, create a new RAID-5 volume that uses all four disks. 

E. From File and Storage Services, create virtual disks by using thin provisioning. 

Answer: B,E 


Q252. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The network contains a DHCP server named DHCP1. 

You add a new network segment to the network. 

On the new network segment, you deploy a new server named Server1 that runs Windows 

Server 2012 R2. 

You need to configure Server1 as a DHCP Relay Agent. 

Which server role should you install on Server1? 

To answer, select the appropriate role in the answer area. 

Answer: 


Q253. - (Topic 2) 

You have a print server named Print1 that runs Windows Server 2012 R2. Print1 has 10 shared printers. You need to change the location of the spool folder. 

What should you modify? 

A. The properties of the Print Spooler service 

B. The Print Server Properties 

C. The user environment variables 

D. The PrintQueue.inf file 

Answer:


Q254. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

You have a virtual machine named VM1. VM1 has a checkpoint. 

You need to modify the Checkpoint File Location of VM1. 

What should you do first? 

A. Copy the checkpoint file. 

B. Delete the checkpoint. 

C. Shut down VM1. 

D. Pause VM1. 

Answer:


Q255. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed. 

You have logged on to a server, named ENSUREPASS-SR07, and would like to obtain the IP configurations of a server, named ENSUREPASS-SR13. 

Which of the following actions should you take? 

A. You should consider making use of the Winrs.exe command. 

B. You should consider making use of the Winsat.exe command. 

C. You should consider making use of the Winpop.exe command. 

D. You should consider making use of the Dsrm.exe command. 

Answer:


Q256. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is 

verified against a certificate revocation list (CRL). What should you do? 

A. Modify the rule for App1. 

B. Modify the Trusted Publishers Properties. 

C. Create a new certificate rule for App1. 

D. Modify the Enforcement Properties. 

Answer:


Q257. - (Topic 3) 

On Server1, you plan to create an inbound firewall rule that contains the following settings: 

Allows inbound connections to an application named App1.exe 

Applies to the domain profile 

Overrides any block rules 

You need to identify the minimum information required to create the rule. 

Which two pieces of information should you identify? Each correct answer presents part of the solution. 

A. the list of computers that are authorized to use the application 

B. the list of Active Directory users who are authorized to use the application 

C. the hash of the application 

D. the name of the IPSec policies that apply to Server1 

E. the local path of the application 

Answer: A,E 


Q258. - (Topic 3) 

Your network contains two subnets. The subnets are configured as shown in the following table. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1. 

You run the route print command as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that Server1 can communicate with the client computers on LAN2. 

What should you do? 

A. Change the default gateway address. 

B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. 

C. Change the metric of the 10.10.1.0 route. 

D. Set the state of the Teredo interface to disable. 

Answer:

Explanation: 

The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2. 

In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such “last” addresses of a subnet are considered “broadcast” addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so it’s not a very common practice. Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 


Q259. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

On Server1, you open Computer Management as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can create a 3-TB volume on Disk 1. 

What should you do first? 

A. Create a storage pool. 

B. Convert the disk to a GPT disk. 

C. Create a VHD, and then attach the VHD. 

D. Convert the disk to a dynamic disk. 

Answer:


Q260. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

Contoso.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple virtual machines. 

You have enabled the use of Single-root I/O virtualization. 

Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.) 

A. It maximizes network throughput, while minimizing network latency. 

B. It maximizes network throughput, as well as network latency. 

C. It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch. 

D. It prevents the virtual machine from accessing the network switch directly. 

Answer: A,C 

Explanation: 

SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V virtualizationstack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments.