We provide real 70 410 exam questions exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 410 installing and configuring windows server 2012 Exam quickly & easily. The 70 410 dumps PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 410 vce dumps pdf and vce product and material, you can easily pass the 70 410 exam dumps exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q181. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install a network monitoring application on VM2. 

You need to ensure that all of the traffic sent to VM3 can be captured on VM2. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. And since Port mirroring allows the network traffic of a virtual machine to be monitored by copying the traffic and forwarding it to another virtual machine that is configured for monitoring, you should configure port mirroring on VM2. 

: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror 


Q182. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. 

You need to ensure that users can recover files that they accidently delete from Documents. 

What should you do? 

A. Enable shadow copies by using Computer Management. 

B. Create a storage pool that contains a two-way mirrored volume by using Server Manager. 

C. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console. 

D. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK). 

Answer:

Explanation: 

If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot select specific shared folders and files on a volume to be copied or not copied. 

To enable and configure Shadow Copies of Shared Folders: 

1. Click Start, point to Administrative Tools, and then click Computer Management. 

2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies. 

3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable. 

4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings. 

5. To make changes to the default schedule and storage area, click Settings. 

Shadow copies - a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 

7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302 


Q183. - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You need to install the Remote Desktop Services server role on Server2 remotely from Server1. Which tool should you use? 

A. The dsadd.exe command 

B. The Server Manager console 

C. The Remote Desktop Gateway Manager console 

D. The Install-RemoteAccess cmdlet 

Answer:


Q184. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named LAN3. 

You create a network adapter team named Team1 from the two adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2. 

A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. 

You need to identify how many DHCP reservations you must create for Server1. 

How many reservations should you identify? 

A. 3 

B. 4 

C. 6 

D. 8 

Answer:

Explanation: 

1 for each NIC Team (2 total) and 1 for each non-teamed NIC (2 total) -> 4 total IP addresses are required. 


Q185. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. 

You create an account for a temporary employee named User1. 

You need to ensure that User1 can log on to the domain only between 08:00 and 18:00 

from a client computer named Computer1. 

From which tab should you perform the configuration? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q186. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN. 

You need to view the properties of the VPN connection. 

Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 

Answer: 


Q187. - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. 

On VM5, you install a network monitoring application named Monitor1. 

You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM “VM6 | Set-VMNetworkAdapter-IovWeight 1 

B. Get-VM “VM5 I Set-VMNetworkAdapter -IovWeight 0 

C. Get-VM “VM5 | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM “VM6 | Set-VMNetworkAdapter -AllowTeaming On 

E. Get-VM “VM6 | Set-VMNetworkAdapter -PortMirroring Destination 

F. Get-VM “VM5 | Set-VMNetworkAdapter -AllowTeaming On 

Answer: C,E 

Explanation: 

-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. . If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. . If set to Destination, it receives copied packets from the source virtual network adapter. 

In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source. 

Reference: http://technet.microsoft.com/en-us/library/hh848457.aspx 


Q188. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the Security Templates snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Authorization Manager 

B. Local Security Policy 

C. Certificate Templates 

D. System Configuration 

Answer:

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 


Q189. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012 R2. 

CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1. 

When you attempt to remove Printer1 from CONT2, you receive the error message shown in the exhibit. (Click the Exhibit button.) 

You successfully delete the other printers installed on CONT2. 

You need to identify what prevents you from deleting Printer1 on CONT2. 

What should you identify? 

A. Printer1 is deployed as part of a mandatory profile. 

B. Printer1 is deployed by using a Group Policy object (GPO). 

C. Your user account is not a member of the Print Operators group on CONT2. 

D. Your user account is not a member of the Print Operators group on CONT1. 

Answer:


Q190. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. 

The domain controllers are configured as shown in the following table. 

In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2. Server1 is in a workgroup. 

You need to perform an offline domain join of Server1 to the contoso.com domain. 

What should you do first? 

A. Transfer the PDC emulator role to Dc1. 

B. Run the djoin.exe command. 

C. Run the dsadd.exe command. 

D. Transfer the infrastructure master role to DC1. 

Answer:

Explanation: 

A. Creates a new Active Directory computer. 

B. Use djoin for offline join in the perimeter network 

C. Adds specific types of objects to the directory. 

D. Add the local computer to a domain or workgroup.