Attention: Braindump2go Money Back Guarantee For New Released Exam 70-410 Practice Tests Software and PDF! (91-105)

Download Microsoft Exam Center Latest Updated 70-410 Exam Questions from Braindump2go for free now! Braindump2go 70-410 Dumps Questions ans Answers are the Latest and also provide free updation for all Exam Dumps! Guarantee 100% Exam Pass Or Money Back!

Vendor: Microsoft
Exam Code: 70-410
Exam Name: Installing and Configuring Windows Server 2012 R2 Exam

Read More

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(421-424)!

QUESTION 421
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2.
You need to create a Windows Firewall rule to prevent administrators from using Internet Explorer to access the Internet while they are logged on interactively to the servers. The solution must not prevent administrators from accessing websites on the internal network.
How should you configure the rule?
To answer, select the appropriate options in the answer area.
 clip_image001[64]
Answer:
 clip_image001[66]

QUESTION 422
Your network contains a server named Server1 and 10 Web servers. All servers run Windows Server 2012 R2.
You create a Windows PowerShell Desired State Configuration (DSC) to push the settings from Server1 to all of the Web servers.
On Server1, you modify the file set for the Web servers.
You need to ensure that all of the Web servers have the latest configurations.
Which cmdlet should you run on Server1?

A.    Restore-DcsConfiguration
B.    Set DcsLocalConfigurationManager
C.    Start-DcsConfiguration
D.    Get-DcsConfiguration

Answer: C

QUESTION 423
Hotspot Question
Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN. You need to view the properties of the VPN connection. Which connection properties should you view? To answer, select the appropriate connection properties in the answer area.
 clip_image001[68]
Answer:
  clip_image001[70]

QUESTION 424
Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed.Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Enable the Device Registration Service in Active Directory.
B.    Publish the Device Registration Service by using a Web Application Proxy.
C.    Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D.    Install the Work Folders role service on Server2.
E.    Create and configure a sync share on Server2.

Answer: AC
Explanation:
*Prepare your Active Directory forest to support devices This is a one-time operation that you must run to prepare your Active Directory forest to support devices.
To prepare the Active Directory forest
On your federation server, open a Windows PowerShell command window and type:
Initialize-ADDeviceRegistration
*Enable Device Registration Service on a federation server farm node To enable Device Registration Service
1.On your federation server, open a Windows PowerShell command window and type:
Enable-AdfsDeviceRegistration
2.Repeat this step on each federation farm node in your AD FS farm.

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(411-420)!

QUESTION 411
Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1.
You download several signed Windows PowerShell scripts from the Internet.
You need to run the PowerShell scripts on all of the servers and all of the client computers.
What should you modify first?

A.    the environment variables on all of the servers
B.    the environment variables on all client computers
C.    the execution policy on all of the servers
D.    the execution policy on all of the client computers

Answer: D

QUESTION 412
Hotspot Question
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual machines.
You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot.
What should you do? To answer, select the appropriate options in the answer area.
 clip_image001[50]
Answer:
 clip_image001[52]

QUESTION 413
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that runs Windows Server 2012 R2.
On Server1, you create a work folder named Work1.
A user named User1 connects to Work1 from a computer named Computer1.
You need to identify the last time the documents in Work1 were synchronized successfully from Computer1.
What should you do?

A.    From Windows PowerShell, run the Get-SyncShare cmdlet.
B.    From Windows PowerShell, run the Get-SyncUserSettings cmdlet.
C.    From Server Manager, review the properties of Computer1.
D.    From Server Manager, review the properties of User1.

Answer: D

QUESTION 414
Drag and Drop Question
You have a server named Server1 that runs Windows Server 2012 R2.
You add a new internal SAS disk to Server1.
You need to ensure that the new disk is available to store files.
Which three cmdlets should you run in sequence?
To answer, move the appropriate three cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.
 clip_image001[54]
Answer:

clip_image001[56]

QUESTION 415
Drag and Drop Question
You have a Hyper-V host named Host1. Host1 contains two virtual machines named VM1 and VM2. VM1 is configured as a print server. VM1 runs Windows Server 2008 R2. VM2 is configured as a file server. VM2 runs Windows Server 2012 R2.
You need to migrate all of the printers on VM1 to VM2.
Which actions should you perform on the virtual machines?
To answer, drag the appropriate action to the correct servers in the answer area. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
 clip_image002[24]
Answer:
 clip_image002[26]

QUESTION 416
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. All client computers run Windows 8.
The domain contains a security group named Group1.
You have a Group Policy object (GPO) named GP01. GPO1 is linked to the domain.
You need to ensure that only the members of Group1 can run the applications shown in the following table.
 clip_image001[58]
Which type of application control policy should you implement for each application?
To answer, drag the appropriate rule types to the correct applications. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
 clip_image001[60]
Answer:
 clip_image001[62]

QUESTION 417
Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.
What should you do?

A.    Add User1 to the Group Policy Creator Owners group.
B.    Modify the permissions on the User1 account.
C.    Modify the permissions on OU1.
D.    Run the Delegation of Control Wizard on the Policies container.

Answer: C

QUESTION 418
Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of groups, many of which are nested in other groups.
The domain contains a user account named User1. User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the nested groups. The solution must minimize administrative effort.
Which tool should you use?

A.    ADSI Edit
B.    Get-ADUser
C.    Active Directory Users and Computers
D.    Dsget

Answer: B

QUESTION 419
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server 2012 R2.
You need to manage Server2 remotely from Server1.
What should you do?

A.    From Server2, run the Enable-PsRemoting cmdlet.
B.    From Server1, run the winrni command.
C.    From Server2, run the winrm command.
D.    From Server1, run the Enable-PsRemoting cmdlet.

Answer: A

QUESTION 420
Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All domain controllers run Windows Server 2012 R2.
The contoso.com domain contains two user accounts named Admin1 and Admin2.
You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2.
Which built-in groups should you use?

A.    Server Operators global groups
B.    Domain Admins global groups
C.    Administrators domain local groups
D.    Administrators local groups

Answer: B

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(401-410)!

QUESTION 401
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.
What should you do?

A.    From Server Manager, change the load balancing mode of Team1.
B.    Run the New-NetLbfoTeam cmdlet.
C.    From Server Manager, add an interface to Team1.
D.    Run the Add-NetLbfoTeamMember cmdlet.

Answer: C

QUESTION 402
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a script that will create and mount a virtual hard disk.
Which tool should you use?

A.    vdsldr.exe
B.    diskpart.exe
C.    fsutil.exe
D.    vds.exe

Answer: B

QUESTION 403
Hotspot Question
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
All server are configured to enforce AppLocker policies.
You install a server named Server1.
On Server1, you install an application named appl.exe in a folder located on C:\App1.
You have two domain groups named Group1 and Group2. A user named User1 is a member of Group1 and Group2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com.
You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click the Exhibit button.)
 clip_image002[14]
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
 clip_image001[40]
Answer:

clip_image001[42]

QUESTION 404
You have virtual machine named VM1.
VM1 uses a fixed size virtual hard disk (VHD) named diskl.vhd. Diskl.vhd is 200 GB.
You shut down VM1.
You need to reduce the size of diskl.vhd.
Which action should you select from the Edit Virtual Hard Disk Wizard?

A.    Merge
B.    Compact
C.    Shrink
D.    Convert

Answer: D

QUESTION 405
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual machines that run Windows Server 2012 R2.
Your company uses smart cards for authentication.
You need to ensure that you can use smart card authentication when you connect to the virtual machine by using Virtual Machine Connection.
What should you configure?

A.    The NUMA Spanning settings
B.    The RemoteFX settings
C.    The Enhanced Session Mode Policy
D.    The Integration Services settings

Answer: C

QUESTION 406
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?

A.    Computer Management
B.    Server Manager
C.    Share and Storage Management
D.    New-VirtualDisk

Answer: A

QUESTION 407
Hotspot Question
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual machines that run Windows Server 2008 R2. The virtual machines connect to a private virtual switch.
You have a file that you want to copy to all of the virtual machines.
You need to identify to which servers you can copy files by using the Copy-VmFile cmdlet.
What command should you run?
To answer, select the appropriate options in the answer area.
 clip_image001[44]
Answer:
 clip_image001[46]

QUESTION 408
Hotspot Question
Your network contains an Active Directory forest. The forest contains a single domain named contoso.com.
AppLocker policies are enforced on all member servers.
You view the AppLocker policy applied to the member servers as shown in the exhibit.
(Click the Exhibit button.)
 clip_image002[16]
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
 clip_image002[18]
Answer:
 clip_image002[20]

QUESTION 409
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.
You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table.
 clip_image001[48]
The DHCP clients in Subnet_Tor can connect to the client computers in Subnet_Mtl by using an IP address or a FQDN. You discover that the DHCP clients in Subnet_Mtl can connect to client computers in Subnet_Tor by using an IP address only.
You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.
What should you add?

A.    The 015 DNS Domain Name option to Subnet_Mtl
B.    The 015 DNS Domain Name option to Subnet_Tor
C.    The 006 DNS Servers option to Subnet_Mtl
D.    The 006 DNS Servers option to Subnet_Tor

Answer: C

QUESTION 410
You have a server named Server1 that runs Windows Server 2012 R2.
You add an additional disk to Server1 as shown in the exhibit. (Click the Exhibit button.)

 clip_image002[22]
You need to ensure that users can access the additional disk from drive C.
What should you do?

A.    Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.
B.    Convert Disk 1 to a dynamic disk and create a spanned volume.
C.    Create a simple volume on Disk 1 and mount the volume to a folder.
D.    Convert Disk 0 to a dynamic disk and add a mirror.

Answer: C

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(391-400)!

QUESTION 391
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2.
You need to switch Server1 to a Server Core installation of Windows Server 2012 R2.
What command should you run?
To answer, select the appropriate options in the answer area.
 clip_image001[8]
Answer:
 clip_image001[10]

QUESTION 392
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to use Windows PowerShell Desired State Configuration (DSC) to confirm that the Application Identity service is running on all file servers.
You define the following configuration in the Windows PowerShell Integrated Scripting Environment (ISE):
 clip_image001[12]
You need to use DSC to configure Server1 as defined in the configuration.
What should you run first?

A.    Service 1
B.    Test-DscConfiguration
C.    Start-DscConfiguration
D.    Configuration1

Answer: D

QUESTION 393
Drag and Drop Question
You are configuring a multi-subnet IPv6 network for a regional office.
The corporate network administrator allocates the 2001:0db8:1234:0800: :/54 address space for your use.
You need to identify network IDs of the first and last subnets that you will be able to create at the office.
Which network IDs should you identify?
To answer, drag the appropriate network IDs to the correct subnets. Each network ID may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
 clip_image001[14]
Answer:
 clip_image002[6]

QUESTION 394
Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2.
You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.
You need to ensure that Scope1 has a subnet mask of 255.255.255.0.
What should you do first?

A.    From the DHCP console, reconcile Scope1.
B.    From the DHCP console, delete Scope1.
C.    From the DHCP console, modify the Scope Options of Scope1.
D.    From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.

Answer: B

QUESTION 395
Hotspot Question
You have a print server named Server1 that runs Windows Server 2012 R2.
On Server1, you create and share a printer named Printer1.
The Advanced settings of Printer1 are shown in the Advanced exhibit. (Click the Exhibit button.)
 clip_image001[16]
The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.)
 clip_image001[18]
The Members settings of a group named Group1 are shown in the Group1 exhibit. (Click the Exhibit button.)
 clip_image001[20]
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
 clip_image001[22]
Answer:
 clip_image001[24]

QUESTION 396
Hotspot Question
A printer named Printer1 is configured as shown in the exhibit. (Click the Exhibit button.)
 clip_image001[26]
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
 clip_image001[28]
Answer:
 clip_image001[30]

QUESTION 397
Hotspot Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
You need to add a user named User1 to a group named ServerAdmins.
What command should you run?
To answer, select the appropriate options in the answer area.
 clip_image001[32]
Answer:
 clip_image001[34]

QUESTION 398
Hotspot Question
You have a DHCP server named Server1 that runs Windows Server 2012 R2.
On Server1, you run the commands as shown in the exhibit. (Click the Exhibit button.)
 clip_image002[8]
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
 clip_image001[36]
Answer:
 clip_image001[38]

QUESTION 399
Drag and Drop Question
You have a server named Server1 that runs Windows Server 2012 R2.
You need to perform the following storage configuration tasks on Server1:
– Bring a disk named Diskl online.
– Defragment a volume named Volumel.
– Remove a disk named Disk2 from a storage pool named Pooll.
Which cmdlet should you use to perform each task?
To answer, drag the appropriate cmdlets to the correct tasks. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
 clip_image002[10]
Answer:
 clip_image002[12]

QUESTION 400
Your network contains an Active Directory domain named contoso.com.
You have a DHCP server named Server1 that runs Windows Server 2008.
You install Windows Server 2012 R2 on a server named Server2. You install the DHCP Server server role on Server2.
You need to migrate the DHCP services from Server1 to Server2. The solution must meet the following requirements:
– Ensure that existing leases are migrated.
– Prevent lease conflicts.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A.    On Server1, run the Export-DhcpServer cmdlet.
B.    On Server1, run the Stop-Service cmdlet.
C.    On Server2, run the Receive-SmigServerData cmdlet.
D.    On Server2, run the Stop-Service cmdlet.
E.    On Server2, run the Import-DhcpServer cmdlet.
F.    On Server1, run the Send-SmigServerData cmdlet.

Answer: ABE

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(381-390)!

QUESTION 381
Which of the following are the two built-in user accounts created automatically on a computer running Windows Server 2012 R2?

A.    Network
B.    Interactive
C.    Administrator
D.    Guest

Answer: CD
Explanation:
A. Incorrect: There is no Network account in Windows Server 2012 R2.
B. Incorrect: There is no Interactive account in Windows Server 2012 R2.
C. Correct: By default, the two built-in user accounts created on a computer running Windows Server 2012 are the Administrator account and the Guest account.
D. Correct: By default, the two built-in user accounts created on a computer running Windows Server 2012 are the Administrator account and the Guest account.

QUESTION 382
Which of the following is not a type of user account that can be configured in Windows Server 2012 R2?

A.    local accounts
B.    domain accounts
C.    network accounts
D.    built-in accounts

Answer: C
Explanation:
A. Incorrect: Local accounts can be created and configured in Windows Server 2012 R2.
B. Incorrect: Domain accounts can be created and configured in Windows Server 2012 R2.
C. Correct: Three types of user accounts can be created and configured in Windows Server 2012: local accounts, domain accounts, and built-in user accounts.
D. Incorrect: Built-in accounts can be created and configured in Windows Server 2012 R2.

QUESTION 383
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup.
On Server1 and Server2, you create a local user account named Admin1. You add the account to the local Administrators group. On both servers, Admin1 has the same password.
You log on to Server1 as Admin1. You open Computer Management and you connect to Server2.
When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.
What should you configure on Server2?

A.    From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value.
B.    From Local Users and Groups, modify the membership of the Remote Management Users group.
C.    From Server Manager, modify the Remote Management setting.
D.    From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.

Answer: A
Explanation:
The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely administer the computer.
http://support.microsoft.com/kb/942817

QUESTION 384
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2. You join Corel to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?

A.    Run the Disable NetFirewallRule cmdlet.
B.    Install Remote Server Administration Tools (RSAT).
C.    Install Windows Management Framework.
D.    Run the Enable-C.

Answer: D
Explanation:
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the NetFirewallRule command. This will allow you to view the event logs.

QUESTION 385
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.
 clip_image001
You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1.
What should you do before you create the snapshot?

A.    Run the Stop-VM cmdlet.
B.    Decrease the Minimum RAM.
C.    Run the Convert-VHD cmdlet.
D.    Convert diskl.vhd to a dynamically expanding disk.

Answer: A
Explanation:
Original answer is D.
But the correct answer is A.
The disk configuration (dynamic Vs. fixed) has little impact on the snapshot size.
However snapshotting a machine whilst it is running means a RAM dump is also saved to preserve the systems running state at that moment. That requires as much disk space as RAM being used at that time. This is avoided if the machine is shutdown first, reducing the snapshot size by a great deal.

QUESTION 386
You have a server named Serverl that runs Windows Server 2012 R2.
You try to install the Microsoft .NET Framework 3.5 Features feature on Serverl, but the installation fails repeatedly.
You need to ensure that the feature can be installed on Serverl.
What should you do?

A.    Run the Add-AppxProvisionedPackage cmdlet.
B.    Disable User Account Control (UAC).
C.    Connect Serverl to the Internet.
D.    Remove the .NET Framework 4.5 Features feature.

Answer: C

QUESTION 387
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You create a LUN on the SAN to host the virtual hard drive files for the virtual machines.
You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space.
Which type of virtual hard disk should you create on the LUN?

A.    Fixed-size VHDX
B.    Dynamically expanding VHDX
C.    Fixed-size VHD
D.    Dynamically expanding VHD

Answer: A

QUESTION 388
Hotspot Question
You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 hosts a virtual machine named Server1. Server1 uses a disk named Server1.vhdx that is stored locally on Hyperv1.
You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on another server.
You need to configure Server1 to meet the following requirements:
– Ensure that Server1 can start by using Server1.vhdx.
– Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.
Which two objects should you configure?
To answer, select the appropriate two objects in the answer area.
 clip_image002
Answer:

clip_image002[4]

QUESTION 389
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in the following table.
 clip_image001[6]
You create a virtual machine named VM1. VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2. You configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?

A.    Run the Set-VmNetworkAdapter cmdlet.
B.    Create a new virtual switch on Server1.
C.    Modify the properties of vSwitch1 and vSwitch2.
D.    Add a new network adapter to VM1.

Answer: A

QUESTION 390
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Host1 hosts two virtual machines named VMS and VM6. Both virtual machines connect to a virtual switch named Virtual 1.
On VM5, you install a network monitoring application named Monitor1.
You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)

A.    Get-VM "VM6" | Set-VMNetworkAdapter-IovWeight 1
B.    Get-VM "VM5" I Set-VMNetworkAdapter -IovWeight 0
C.    Get-VM "VM5" | Set-VMNetworkAdapter -PortMirroring Source
D.    Get-VM "VM6" | Set-VMNetworkAdapter -AllowTeaming On
E.    Get-VM "VM6" | Set-VMNetworkAdapter -PortMirroring Destination
F.    Get-VM "VM5" | Set-VMNetworkAdapter -AllowTeaming On

Answer: CE

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(371-380)!

QUESTION 371
A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice.
The server team would like four of the servers to include the Windows 8 Shell. Which installation option is required for these servers?

A.    Server Core
B.    Desktop Experience
C.    Server with a GUI
D.    Minimal Server Interface

Answer: B
Explanation:
The Desktop Experience installation option includes the Windows 8 Shell feature. This installation option also includes other features available for installation not found in the other three; such as Themes, Windows Store and support for Windows Store apps, and Windows Media Player.
Quick Tip: To completely remove a feature and the binary files from the disk, use the Windows PowerShell command Uninstall-WindowsFeature. For example, to remove Desktop Experience:
Uninstall-WindowsFeature Desktop-Experience -Remove
http://technet.microsoft.com/en-us/library/hh831786.aspx
http://mcpmag.com/articles/2013/01/22/70-410-win2012-install.aspx

QUESTION 372
A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network.
Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server?

A.    Reservation
B.    Scope options
C.    NAP
D.    Scope properties

Answer: A
Explanation:
Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address.
Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range.
Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices.
http://technet.microsoft.com/en-us/library/jj200226.aspx
http://mcpmag.com/articles/2013/02/12/70-410-dhcp.aspx
Another correct answer? Create a Exclusion Range? You decide… but that option is not at the options list at this question.
 clip_image002[24]

QUESTION 373
A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems.
Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports?

A.    2003 R2
B.    2008
C.    2003
D.    2012

Answer: BD
Explanation:
Windows Server 2008, 2008 R2, and 2012 R2 can be guest operating systems when using Hyper-V Fibre Channel host bus adaptors (HBAs). Updated HBA drivers are needed along with NPIV-enabled (N_Port ID Virtualization) SANs.
Quick Tip: Virtual Fibre Channel logical units cannot be used as boot media.
http://technet.microsoft.com/en-us/library/hh831413.aspx
http://mcpmag.com/articles/2013/02/05/70-410-win2012-fibre.aspx

QUESTION 374
A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell.
Which Windows PowerShell module includes the command-line options for installing domain controllers?

A.    AD DS Administration cmdlets
B.    AD DS Deployment cmdlets
C.    AD CS Deployment cmdlets
D.    AD DS Administration cmdlets

Answer: B
Explanation:
First use the Import-Module ADDSDeployment command in PowerShell–it includes the cmdlets needed to add new domain controllers. Then run Install-ADDSDomainController along with the required arguments.
Quick Tip: DCPromo.exe has been deprecated but can still be used along with an answer file, and ADPrep.exe runs automatically when needed (but can be run with elevated rights for more control).
http://technet.microsoft.com/en-us/library/hh994618.aspx
http://mcpmag.com/articles/2013/02/19/70-410-win2012-ad.aspx

QUESTION 375
A company’s server administration team would like to take advantage of the newest file systems available with Windows Server 2012 R2. The team needs a file system capable of managing extremely large data drives that can auto-detect data corruption and automatically perform needed repairs without taking a volume offline.
Which file system should the server administration team choose?

A.    NFS
B.    DFS
C.    NTFS
D.    ReFS

Answer: D
Explanation:
The ReFS (Resilient File System) is capable of managing extremely large data drives (1 YB Yottabyte), can auto-detect data corruption, and automatically perform needed repairs without taking the volume offline.
Quick Tip: The command fsutil fsinfo volumeinfo x: will display the volume file system. ReFS is only intended for data drives and not compatible with all Windows Server 2012 R2 file system technologies, however it is compatible with the new Storage Spaces.
http://technet.microsoft.com/en-us/library/hh831724.aspx
http://mcpmag.com/articles/2013/01/29/70-410-win2012-file.aspx

QUESTION 376
A company’s server security team needs a solution that will prevent users from installing and using unauthorized applications on their Windows 8 desktop computers. Which technology should the team choose?

A.    Starter GPOs
B.    Group Policy Objects
C.    Software Restriction Policies
D.    AppLocker

Answer: D
Explanation:
AppLocker (Application Locker) can help prevent malicious (malware) and unsupported applications from affecting computers. These include executable files, scripts, Windows Installer files, DLLs, Packaged apps and Packaged app installers.
Quick Tip: AppLocker is also supported by Windows Server 2008 R2 and Windows 7.
http://technet.microsoft.com/en-us/library/hh831440.aspx
http://mcpmag.com/articles/2013/02/26/controlling-applications.aspx ExamRef

QUESTION 376
You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. Which of the following could possibly be causes for the failure? (Choose all answers that are correct.)

A.    There are still members in the group.
B.    One of the group’s members has the group set as its primary group.
C.    You do not have the proper permissions for the container in which the group is located.
D.    You cannot delete global groups from the Active Directory Users and Computers console.

Answer: BC
Explanation:
A. Incorrect: It is possible to delete a group that has members.
B. Correct: If any member sets the group as its primary group, then the system does not permit the group to be deleted.
C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is located to delete it.
D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console.

QUESTION 377
In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can members of a global group? (Choose all answers that are correct.)

A.    Users
B.    Computers
C.    Universal groups
D.    Global groups

Answer: ABD
Explanation:
A. Correct: Users can be security principals in a global group.
B. Correct: Computers can be security principals in a global group.
C. Incorrect: Universal groups cannot be security principals in a global group.
D. Correct: Global group can be security principals in a global group.

QUESTION 378
Which of the following group scope modifications are never permitted? (Choose all answers that are correct.)

A.    Global to universal
B.    Global to domain local
C.    Universal to global
D.    Domain local to universal

Answer: B
Explanation:
A. Incorrect: Global to universal group conversions are sometimes permitted.
B. Correct: Global to domain local group conversions are never permitted.
C. Incorrect: Universal to global group conversions are sometimes permitted.
D. Incorrect: Domain local to universal group conversions are sometimes permitted.

QUESTION 379
Which of the following is not a correct reason for creating an OU?

A.    To create a permanent container that cannot be moved or renamed
B.    To duplicate the divisions in your organization
C.    To delegate administration tasks
D.    To assign different Group Policy settings to a specific group of users or computers

Answer: A
Explanation:
A. Correct: The reasons for creating an OU include duplicating organizational divisions, assigning Group Policy settings, and delegating administration. You can easily move or rename an OU at will.
B. Incorrect: Duplicating organizational divisions is a viable reason for creating an OU.
C. Incorrect: Delegating administration tasks is a viable reason for creating an OU.
D. Incorrect: Assigning Group Policy settings is a viable reason for creating an OU.

QUESTION 380
Which of the following groups do you use to consolidate groups and accounts that either span multiple domains or the entire forest?

A.    Global
B.    Domain local
C.    Built-in
D.    Universal

Answer: D
Explanation:
A. Incorrect: Global groups cannot contain users from other domains.
B. Incorrect: Domain local groups cannot have permissions for resources in other domains.
C. Incorrect: Built-in groups have no inherent cross-domain qualities.
D. Correct: Universal groups, like global groups, are used to organize users according to their resource access needs. You can use them to organize users to facilitate access to any resource located in any domain in the forest through the use of domain local groups. Universal groups are used to consolidate groups and accounts that either span multiple domains or the entire forest.