Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(351-360)!

QUESTION 351
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have just executed the Uninstall-WindowsFeature Server-Gui-Shell L2P.com server, named L2P-SR13.
Which of the following is the reason for doing this?

A.    To only remove Windows Explorer from L2P-SR13.
B.    To only remove the Windows Internet Explorer from L2P-SR13.
C.    To only remove the components and files related to Windows Explorer from L2PSR13.
D.    To remove Windows Explorer, Windows Internet Explorer, and all associated components and files from
L2P-SR13.

Answer: D
Explanation:
Minimal Server Interface
If the server has a full installation of Windows Server, and I need to bring the server down to minimal server interface, I only need to remove the Server-GUI-Shell. The command is shown here.
Get-WindowsFeature Server-Gui-Shell | Uninstall-WindowsFeature – restart
Minimal Server Interface is situated between the Server Core and Server with a GUI modes, you can either install features on Server Core or remove features from Server with a GUI to reach the Minimal Server Interface installation state
http://blogs.technet.com/b/heyscriptingguy/archive/2013/01/25/use-powershell-to-remove-the-gui-on- windows-server-2012.aspx
http://blogs.technet.com/b/server_core/archive/2012/05/09/configuring-the-minimal-server-interface.aspx

QUESTION 352
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have been instructed to add a new domain controller to L2P.com’s existing environment.
Which of the following actions should you take?

A.    You should consider making use of Server Manager.
B.    You should consider making use of Authorization Manager.
C.    You should consider making use of Remote Desktop Gateway Manager.
D.    You should consider making use of Network Load Balancing Manager.

Answer: A
Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/12370.step-by-step-guide-for-setting-up-windows- server-2012-domain-controller.aspx

QUESTION 3513
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 installed.
You have been instructed to modify an Active Directory computer object.
Which of the following actions should you take?

A.    You should consider making use of the Get-ADComputer Windows PowerShell cmdlet.
B.    You should consider making use of the Set-ADComputer Windows PowerShell cmdlet
C.    You should consider making use of the New-ADComputer Windows PowerShell cmdlet
D.    You should consider making use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet

Answer: B
Explanation:
Set-ADComputer – Modifies an Active Directory computer object.
http://technet.microsoft.com/en-us/library/ee617263.aspx

QUESTION 354
You work as an administrator at L2P.com. The L2P.com network consists of an Active Directory forest that contains a root domain, named L2P.com, and two child domains, named us.L2P.com and uk.L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.
The root domain hosts a domain local distribution group, named L2PGroup. You are preparing to issue L2PGroup read-only access to a shared folder hosted by the us.L2P.com domain.
You want to make sure that L2PGroup is able to access the shared folder in the us.L2P.com domain.
Which of the following actions should you take?

A.    You should consider re-configuring L2PGroup as a universal Admins group.
B.    You should consider re-configuring L2PGroup as a universal security group.
C.    You should consider re-configuring L2PGroup as a global administrators group.
D.    You should consider re-configuring L2PGroup as a local administrators group.

Answer: B
Explanation:
Group scope Universal can be assigned permissions in any domain or forest.
 clip_image001[28]
http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx

QUESTION 355
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
L2P.com has a domain controller, named L2P-DC01, which has Windows Server 2012 R2 installed. Another L2P.com domain controller, named L2P-DC02, has Windows Server 2008 R2 installed.
You have deployed a server, named L2P-SR15, on L2P.com’s perimeter network. L2PSR15 is running a Server Core Installation of Windows Server 2012 R2.
You have been instructed to make sure that L2P-SR15 is part of the L2P.com domain.
Which of the following actions should you take?

A.    You should consider making use of Set-Computer Windows PowerShell cmdlet on L2P-SR15.
B.    You should consider making use of Get-Computer Windows PowerShell cmdlet on L2P-SR15.
C.    You should consider making use of Test-Computer Windows PowerShell cmdlet on L2P-SR15.
D.    You should consider making use of Add-Computer Windows PowerShell cmdlet on L2P-SR15.

Answer: D
Explanation:
Add-Computer – Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/hh849798.aspx

QUESTION 356
You work as an administrator at L2P.com. The L2P.com network consists of two Active Directory forests, named L2P.com and test.com. There is no trust relationship configured between the forests.
A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the L2P.com domain. You are informed that a GPO must be created in the L2P.com domain, and must be based on the settings of the GPO in the test.com domain.
You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet. You want to complete the task via a Windows PowerShell cmdlet.
Which of the following actions should you take?

A.    You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.
B.    You should consider making use of the Copy-GPO Windows PowerShell cmdlet.
C.    You should consider making use of the New-GPLink Windows PowerShell cmdlet.
D.    You should consider making use of the Import-GPO Windows PowerShell cmdlet.

Answer: D
Explanation:
Import-GPO -Imports the Group Policy settings from a backed-up GPO into a specified GPO.
http://technet.microsoft.com/en-us/library/ee461044.aspx

QUESTION 357
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
L2P.com has a server, named L2P-SR15, which is configured as a file server. You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of L2P-SR15 via Windows Server Backup.
Which of the following actions should you take?

A.    You should consider making use of Computer Management to configure the local groups.
B.    You should consider making use of Computer Management to configure the domain local groups.
C.    You should consider making use of Computer Management to configure the global groups.
D.    You should consider making use of Computer Management to configure the administrator groups.

Answer: A
Explanation:
To perform backups or recoveries by using Windows Server Backup, you must be a member of the Administrators or Backup Operators groups.
http://technet.microsoft.com/en-us/library/ee849849%28v=ws.10%29.aspx
Notes
You can only use Backup locally; you cannot backup a remote computer.
You can only back up and restore System State data on a local computer. You cannot back up and restore System State data on a remote computer even if you are an administrator on the remote computer.
http://technet.microsoft.com/en-us/library/cc776822%28v=ws.10%29.aspx

QUESTION 358
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.
Which of the following is TRUE with regards to Windows Firewall with Advanced Security? (Choose all that apply.)

A.    It provides host-based, two-way network traffic filtering for a computer.
B.    It provides host-based, one-way network traffic filtering for a computer.
C.    It blocks unauthorized network traffic flowing into or out of the local computer.
D.    It only blocks unauthorized network traffic flowing into the local computer.
E.    It only blocks unauthorized network traffic flowing out of the local computer.

Answer: AC
Explanation:
Windows Firewall with Advanced Security is an important part of a layered security model.
By providing host-based, two-way network traffic filtering for a computer, Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of the local computer. Windows Firewall with Advanced Security also works with Network Awareness so that it can apply security settings appropriate to the types of networks to which the computer is connected. Windows Firewall and Internet Protocol Security (IPsec) configuration settings are integrated into a single Microsoft Management Console (MMC) named portant part of your network’s
Windows Firewall with Advanced Security, so Windows Firewall is also an im isolation strategy.
http://technet.microsoft.com/en-us/library/hh831365.aspx

QUESTION 359
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)

A.    Connection security rules allows for traffic to be secured via IPsec.
B.    Connection security rules do not allow the traffic through the firewall.
C.    Connection security rules are applied to programs or services.
D.    Connection security rules are applied between two computers.

Answer: ABD
Explanation:
Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption.
How firewall rules and connection security rules are related
Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection securityrule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied toprograms or services; they are applied between the computers that make up the two endpoints.
http://technet.microsoft.com/en-us/library/cc772017.aspx
http://technet.microsoft.com/en-us/library/cc772017%28v=ws.10%29.aspx

QUESTION 360
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have been instructed to make sure that L2P.com users are not able to install a Windows Store application. You then create a rule for packaged apps.
Which of the following is the rule based on? (Choose all that apply.)

A.    The publisher of the package.
B.    The publisher of the application.
C.    The name of the package
D.    The name of the application
E.    The package version.
F.    The application version.

Answer: ACE
Explanation:
Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8.
They are based on the new app model that ensures that all the files within an app package share the same identity. Therefore, it is possible to control the entire application using a single AppLocker rule as opposed to the non-packaged apps where each file within the app could have a unique identity. Windows does not support unsigned packaged apps which implies all packaged apps must be signed.
AppLocker supports only publisher rules for Packaged apps.
A publisher rule for a Packaged app is based on the following information:
Publisher of the package
Package name
Package version
All the files within a package as well as the package installer share these attributes. Therefore, an AppLocker rule for a Packaged app controls both the installation as well as the running of the app. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups.
http://technet.microsoft.com/en-us/library/hh994588.aspx

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(341-350)!

QUESTION 341
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain have Windows Server 2012 R2 installed, while domain controllers have Windows Server 2008 R2 installed.
You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You are preparing to install the DNS Server role, and enable the global catalog server option.
Which of the following actions should you take?

A.    You should consider making use of Server Manager.
B.    You should consider making use of the Active Directory Installation Wizard.
C.    You should consider making use of the DHCP Installation Wizard
D.    You should consider making use of TS Manager

Answer: A
Explanation:
 clip_image001[20]

 clip_image001[22]
 clip_image001[24]
http://kpytko.pl/2012/09/07/adding-first-windows-server-2012-domain-controller-within-windows- 200320082008r2-network/
http://www.msserverpro.com/migrating-active-directory-domain-controller-from-windows-server-2008-r2-to- windows-server-2012/

QUESTION 342
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. all servers in the L2P.com domain has Windows Server 2012 R2 nstalled.
You have logged on to a server, named L2P-SR07, and would like to obtain the IP configurations of a server, named L2P-SR13.
Which of the following actions should you take?

A.    You should consider making use of the Winrs.exe command.
B.    You should consider making use of the Winsat.exe command.
C.    You should consider making use of the Winpop.exe command.
D.    You should consider making use of the Dsrm.exe command.

Answer: A
Explanation:
Windows Remote Management allows you to manage and execute programs remotely.
You can use WinRS to administer a Server Core installation remotely from the command line. WinRS is a command-line tool included in both Windows Vista and the Full installation of Windows Server 2008, which relies on Windows Remote Management (WinRM) to execute remote commands, especially for headless servers. WinRM is Microsoft’s implementation of the WS-Management protocol, a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that enables hardware and operating systems from different vendors to interoperate. You can think of WinRM as the server side and WinRS the client side of WS-Management.
winrs -r:<some computer> ipconfig /all
 clip_image002[14]
http://technet.microsoft.com/en-us/library/dd163506.aspx

QUESTION 343
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You have been instructed to make sure that a server, named L2P-SR07, is configured to be managed remotely from L2P-SR01 using Server Manager.
Which of the following is not a valid option to take? (Choose all that apply.)

A.    You could access the server manager on L2P-SR01.
B.    You could access the server manager on L2P-SR13.
C.    You could run the %windir%\system32\Configure-SMRemoting.exe from n elevated command prompt
on L2P-SR13.
D.    You could run the Configure-SMRemoting.exe – enable cmdlet on L2P-SR01.

Answer: BC
Explanation:
To enable Server Manager remote management by using Windows PowerShell
 clip_image002[16]
On the computer that you want to manage remotely, do one of the following to open a Windows PowerShell session with elevated user rights.
Configure-SMRemoting.exe -enable
http://technet.microsoft.com/en-us/library/hh921475.aspx
http://technet.microsoft.com/en-us//library/dd759202.aspx

QUESTION 344
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2008 R2 installed.
Most of the L2P.com servers have 64 – bit CPU’s installed, while the rest have 32 – bit CPU’s
installed. You are informed that L2P.com wants to deploy Windows Server 2012 R2 on all their servers.
You need to make recommendations to ensure that this is possible.
Which of the following would you recommend?

A.    You should inform L2P.com that the deployment can proceed without any changes.
B.    You should inform L2P.com that the servers with 32 bit CPU’s must be upgraded to include 64 bit
CPU’s for the deployment to proceed.
C.    You should inform L2P.com that the servers with 64 bit CPU’s must be upgraded to include 32 bit
CPU’s for the deployment to proceed.
D.    You should inform L2P.com that the deployment is not in any way possible.

Answer: B
Explanation:
Windows Server 2012 is a 64-bit only operating system.
Minimum: 1.4 GHz 64-bit processor
http://technet.microsoft.com/en-us/library/jj134246.aspx

QUESTION 345
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 installed.
L2P.com has its headquarters in London, and several widespread satellite offices. When L2P.com releases a new written policy stating that the graphical user interface (GUI) should not be installed on any servers deployed to L2P.com’s satellite offices.
It is reported that a server in one of the satellite offices are not compliant with the new written policy. You are required to remedy the situation, while using the least amount of user interaction.
Which of the following actions should you take?

A.    You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet.
B.    You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager.
C.    You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager.
D.    You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe command
from the command prompt.

Answer: C
Explanation:
One of the great things about Windows PowerShell on Windows Server 2012 is all the great cmdlets and functions. But these did not spring into being from nothingness
http://blogs.technet.com/b/heyscriptingguy/archive/2013/01/25/use-powershell-to-remove-the-gui-on- windows-server-2012.aspx

QUESTION 346
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 installed.
L2P.com has a server, named L2P-SR07, which has four network adapters. L2P.com has two SR07’s network adapters are connected to the one LAN,
local area networks (LANs). Two of L2P-
while the other two are connected to the other LAN.
You are required to configure one of the network adapter pairs into a network adapter team.
Which of the following actions should you take?

A.    You should consider accessing the Group Policy Management Console (GPMC) on L2P-SR07.
B.    You should consider accessing the TS Manager console on L2P-SR07.
C.    You should consider accessing the Server Manager console on L2P-SR07.
D.    You should consider accessing the Remote Desktop Gateway Manager console on L2P-SR07.

Answer: C
Explanation:
NIC teaming, also known as Load Balancing/Failover (LBFO), allows multiple network adapters tobe placed into a team for the purposes of bandwidth aggregation, and/or traffic failover to maintain connectivity in the event of a network component failure.
 clip_image002[18]
#####
 clip_image002[20]
 clip_image002[22]

http://www.microsoft.com/en-us/download/details.aspx?id=30160

QUESTION 347
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 installed.
A server named, L2P-SR13, has a Server Core Installation of Windows Server 2012 installed.
SR13’s installation to a Server with GUI installation.
You are instructed to convert L2P-
You want to use a Windows PowerShell cmdlet that uses Windows Update as a source.
Which of the following actions should you take?

A.    You should consider making use of the Install-WindowsFeature Server-Gui-Mgmt-Infra,
Server-Gui-Shell -Restart cmdlet.
B.    You should consider making use of the Install-WindowsFeature Server-Gui-Mgmt-Infra,
Server-Gui-Shell -Restart -Source c:\mountdir\windows\winsxs cmdlet.
C.    You should consider making use of the Uninstall-WindowsFeature Server-Gui-Shell–Remove cmdlet.
D.    You should consider making use of the Set-ExecutionPolicy cmdlet.

Answer: A
Explanation:
The Full GUI Server Interface provides you with the full GUI of Windows Server 2012 R2.
PowerShell Command: Install-WindowsFeature Server-Gui-Mgmt-Infra, Server-Gui-Shell
When its done, we will need to restart our server by using the Shutdown command:
shutdown -r -t 0
http://blogs.technet.com/b/bruce_adamczak/archive/2013/02/06/windows-2012-core-survival-guide- changing-the-gui-type.aspx
http://www.howtogeek.com/111967/how-to-turn-the-gui-off-and-on-in-windows-server-2012/

QUESTION 348
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing Storage Spaces.
Which of the following is TRUE with regards to Storage Spaces?

A.    Mirroring and parity are optional resilient storage modes of Storage Spaces.
B.    Failover clustering is not supported by Storage Spaces.
C.    Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency,
and thin or fixed provisioning.
D.    Storage spaces are a collection of physical disks with associated attributes such as a preferred
level of resiliency, and thin or fixed provisioning.

Answer: AC
Explanation:
Storage Spaces lets you group drives together in a storage pool. Then you can use pool capacity to create storage spaces.
Storage spaces are virtual drives that appear in File Explorer. You can use them like any other drive, so it’s easy to work with files on them.
You can create large storage spaces and add more drives to them when you run low on pool capacity.
If you have two or more drives in the storage pool, you can create storage spaces that won’t be –or even the failure of two drives, if you create a three-way mirror storage space.
affected by a drive failure
Storage Spaces includes the following features:
1. Storage pools. Storage pools are the fundamental building blocks for Storage Spaces.
Administrators are already familiar with this concept, so they will not have to learn a new model. They can flexibly create storage pools based on the needs of the deployment. For example, given a set of physical disks, an administrator can create one pool (by using all the available physical disks) or multiple pools (by dividing the physical disks as required). Furthermore, to maximize the value from storage hardware, the administrator can map a storage pool to combinations of hard disks as well as solid-state drives (SSDs). Pools can be expanded dynamically by simply adding additional drives, thereby seamlessly scaling to cope with unceasing data growth.
2. Multitenancy. Administration of storage pools can be controlled through access control lists (ACLs) and delegated on a per-pool basis, thereby supporting hosting scenarios that require tenant isolation. Storage Spaces follows the familiar Windows security model; therefore, it can be fully integrated with Active Directory Domain Services.
3. Resilient storage. Storage Spaces support two optional resiliency modes: mirroring and parity. Per-pool support for disks that are reserved for replacing failed disks (hot spares), background scrubbing, and intelligent error correction allow continuous service availability despite storage component failures. In the event of a power failure or cluster failover, the integrity of data is preserved so that recovery happens quickly and does not result in data loss.
4. Continuous availability. Storage Spaces is fully integrated with failover clustering, which allows it to deliver continuously available service deployments. One or more pools can be clustered across multiple nodes within a single cluster. Storage spaces can then be instantiated on individual nodes, and the storage will seamlessly fail over to a different node when necessary (in response to failure conditions or due to load balancing). Integration with CSVs permits scale-out access to data.
5. Optimal storage use. Server consolidation often results in multiple data sets sharing the same storage hardware. Storage Spaces supports thin provisioning to allow businesses to easily share storage capacity among multiple unrelated data sets and thereby maximize capacity use.
6. Storage Spaces also supports trim, automatically running the Storage Optimizer to help reduce the physical footprint of data by consolidating data.
7. Operational simplicity. Fully remoteable and scriptable management is permitted through the Windows Storage Management API, WMI, and Windows PowerShell. Storage Spaces can be easily managed through the File and Storage Services role in Server Manager. Storage Spaces also provides notifications when the amount of available capacity in a storage pool hits a configurable threshold.
 clip_image001[26]
http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools http://technet.microsoft.com/en-us/library/hh831739.aspx
http://www.howtogeek.com/109380/how-to-use-windows-8s-storage-spaces-to-mirror-combine-drives/

QUESTION 349
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing NIC Teaming.
Which of the following is TRUE with regards to NIC Teaming? (Choose all that apply.)

A.    It allows for traffic failover to prevent connectivity loss if a network component fails.
B.    It prevents bandwidth aggregation.
C.    The Windows Server 2012 implementation of NIC Teaming supports a maximum of 5 NICs in a team.
D.    The Windows Server 2012 implementation of NIC Teaming supports a maximum of 32 NICs in a team.

Answer: AD
Explanation:
NIC teaming, also known as Load Balancing/Failover (LBFO), allows multiple network adapters to be placed into a team for the purposes of bandwidth aggregation, and/or traffic failover to maintain connectivity in the event of a network component failure. This feature has long been available from NIC vendors but until now NIC teaming has not been included with Windows Server.
Do I have to select a standby member to get fault tolerance (failover)? No. IN any team with two or more network adapters if a network adapter fails in an Active/Active configuration, the traffic on that network adapter will gracefully failover to the other network adapters in the team even if none of the other adapters are in standby mode.
Number of NICs in a team in a native host
NIC teaming requires the presence of at least one Ethernet NIC. A team of one NIC may be used for separation of traffic using VLANs. Obviously a team with only one team member has no failure protection. Fault protection (failover) requires a minimum of two Ethernet NICs in the team. The Windows Server 2012 implementation supports up to 32 NICs in a team.
Number of team interfaces for a team Windows Server
2012 supports up to 32 team interfaces.
http://download.microsoft.com/download/F/6/5/F65196AA-2AB8-49A6-A427-373647880534/%5BWindows %20Server%202012%20NIC%20Teaming%20(LBFO)%20Deploy
ment%20and%20Management% 5D.docx

QUESTION 350
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing spanned volumes.
Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)

A.    Spanned volumes do not provide fault tolerance.
B.    Spanned volumes are a fault tolerant solution.
C.    You can extend a spanned volume onto a maximum of 16 dynamic disks.
D.    You cannot create a spanned volume using a system volume or boot volume.

Answer: AD
Explanation:
A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk.
You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can extend a spanned volume onto a maximum of 32 dynamic disks.
Spanned volumes are not fault tolerant.
http://technet.microsoft.com/en-us/library/cc772180.aspx

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(331-340)!

QUESTION 331
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec. You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec. What should you do?

A.    From a command prompt, run netsh set global autotuninglevel = restricted congestionprovider = ctcp.
B.    From Windows Firewall with Advanced Security, exempt ICMP from IPSec.
C.    From a command prompt, run netsh set global
autotuninglevelhighlyrestrictedcongestionprovider=none.
D.    From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile.

Answer: B
Explanation:
 clip_image002

QUESTION 332
Hotspot Question
Your network contains an Active Directory domain. The domain contains a server named Server28. The computer account of Server 28 is located in an organizational unit (OU) named OU1. A Group Policy object (GPO) named Application Restriction Policy is linked to OU1. The settings of the GPO are configured as shown in the GPO Settings exhibit. (Click the Exhibit button.)
 clip_image001
The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit button.)
 clip_image001[4]
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
 clip_image001[6]
Answer:
 clip_image002[4]

QUESTION 333
Drag and Drop Question
You have a Hyper-V host named Server1. Server1 hosts a virtual machine named VM1. You view the properties of VM1 as shown in the following exhibit. (Click the Exhibit button.)
 clip_image001[8]
You need to configure bandwidth management for VM1. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

 clip_image001[10]
Answer:
 clip_image002[6]

QUESTION 334
You plan to deploy a file server to a temporary location. The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders. You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs. Which file system should you use?

A.    ReFS
B.    NFS
C.    NTFS
D.    FAT32

Answer: A
Explanation:
The ReFS file system allows for resiliency against corruptions with the option to salvage amongst many other key features like Metadata integrity with checksums, Integrity streams with optional user data integrity, and shared storage pools across machines for additional failure tolerance and load balancing, etc.

QUESTION 335
Your company has a main office and four branch offices. The main office contains a server named Server1 that runs Windows Server 2012 R2. The IP configuration of each office is configured as shown in the following table.
 clip_image001[12]
You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run?

A.    route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1
B.    route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1
C.    route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0
D.    route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1

Answer: B
Explanation:
These parameters will allow communication with all the hosts.
 clip_image001[14]

QUESTION 336
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.
Which of the following describes the results of running this cmdlet?

A.    It removes one or more network adapters from a specified NIC team.
B.    It removes a team interface from a NIC team.
C.    It removes a specified NIC team from the host.
D.    It removes a network adapter member from a switch team.

Answer: C
Explanation:
Remove-NetLbfoTeam removes the specified NIC team from the host
The Remove-NetLbfoTeam cmdlet removes the specified NIC team from the host. This cmdlet disconnects all associated team members and providers from the team. You can specify the team to remove by using either a team object retrieved by Get-NetLbfoTeam, or by specifying a team name.
You can use Remove-NetLbfoTeam to remove all NIC teams from the server.
You need administrator privileges to use Remove-NetLbfoTeam.
http://technet.microsoft.com/en-us/library/jj130848%28v=wps.620%29.aspx

QUESTION 337
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre Channel SAN feature.
Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature? (Choose all that apply.)

A.    It prevents virtual machines from connecting directly to Fibre Channel storage.
B.    It allows for virtual machines to connect to Fibre Channel storage directly.
C.    It includes support for virtual SANs, live migration, and multipath I/O.
D.    It includes support for virtual SANs, and live migration, but not multipath I/O.

Answer: BC
Explanation:
To gain the full benefits of server virtualization and cloud architectures, virtualized workloads need to connect easily and reliably to existing SANs. For many enterprise organizations, Hyper-V deployments were limited in scale and scope because they
lacked the ability to directly connect VMs to Fibre Channel SAN storage from inside a VM. Hyper-V in Windows Server 2012 R2 now provides virtual Fibre Channel Host Bus Adapter (HBA) ports within the guest operating system that runs the virtual machine, connecting virtual machines directly to FibreChannel SAN Logical Unit Numbers (LUNs).
Virtual Fibre Channel for Hyper-V provides several important advantages for Hyper-V environments:
Simplifies storage connectivity for virtualized workloads to ultra-reliable, high-performance Fibre Channel SAN storage
Enables new solutions that require shared storage, such as failover clustering, live migration, andmultipath I/O
Leverages and protects existing investments in Fibre Channel storage ?
Enables advanced FC SAN storage functionality for VMs
Facilitates migration of FC workloads into the cloud
Enables improved monitoring and troubleshooting, with visibility from the VM to the FC SAN storage
Enables centralized management of Ethernet and FC-based virtualized workloads
Combining Virtual Fibre Channel for Hyper-V and the Brocade?Fibre Channel SAN infrastructure greatly simplifies connectivity between Fibre Channel SAN storage and virtualized applications, enabling enterprise IT and hosting providers to achieve new levels of availability, reliability, and scalability for cloud-based services.
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows Server 2012 R2 provides Fibre Channel ports within the guest operating system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads. Support for Fibre Channel in Hyper-V guests also includes support for many relatedfeatures, such as virtual SANs, live migration, and MPIO.
http://technet.microsoft.com/en-us/library/hh831413.aspx
http://www.brocade.com/downloads/documents/technical_briefs/virtual-fibre-channel-hyperv-tb.pdf

QUESTION 338
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2.
You join Server2 to the contoso.com domain. You need to ensure that you can manage Server2 by using the Computer Management console on Server1. What should you do on Server2?

A.    Install Remote Server Administration Tools (RSAT).
B.    Install Windows Management Framework.
C.    Run sconfig.exe and configure remote management.
D.    Run sconfig.exe and configure Remote Server Administration Tools (RSAT).

Answer: C
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.
 clip_image002[8]

QUESTION 339
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
When you recently added new workstations to the L2P.com manually, you found that that the computer accounts were created in the default container. You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU).
Which of the following actions should you take?

A.    You should consider making use of the replace.exe command-line tool.
B.    You should consider making use of the redircmp.exe command-line tool.
C.    You should consider making use of the redirusr.exe command-line tool.
D.    You should consider making use of the rexec.exe command-line tool.

Answer: B
Explanation:
redircmp.exe redirects the default container for newly created computers to a specified, targetorganizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers.
 clip_image002[10]
http://technet.microsoft.com/pt-pt/library/cc770619%28v=ws.10%29.aspx http://support.microsoft.com/kb/324949/en-us
http://support.microsoft.com/kb/555573/en-us

QUESTION 340
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
L2P.com has a Windows Server 2012 R2 domain controller, named L2P-DC01, which has the Domain Naming master and the Schema master roles installed. L2P.com also has a Windows Server 2008 R2 domain controller, named L2P-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles installed.
You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in L2P.com’s perimeter network. You then executed the djoin.exe command.
Which of the following is the purpose of the djoin.exe command?

A.    It sets up a computer account in a domain and requests an offline domain join when a computer restarts.
B.    It sets up a user account in a domain and requests an online domain join when a computer restarts.
C.    It sets up a computer account in a domain and requests an offline domain join immediately.
D.    It sets up a computer account in a domain and requests an online domain join immediately.

Answer: A
Explanation:
To perform an offline domain join, you run commands by using a new tool named Djoin.exe. You use Djoin.exe to provision computer account data into AD DS. You also use it to insert the computer account data into the Windows directory of the destination computer, which is the computer that you want to join to the domain.
/localos Targets the local operating system installation, instead of an offline image, with the domain join information. Because this parameter injects the blob data into the locally running operating system image, you must restart the computer to complete the domain join operation, as you must also do for an onlinedomain join.
 clip_image002[12]
 clip_image001[16]
 clip_image001[18]
http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step-by-step%28v=ws.10%29.aspx

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-411 Exam Dump Free Download(181-190)!

QUESTION 181
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. You need to configure the ports on Server1 to ensure that client computers can establish VPN connections to Server1 by using TCP port 443.
What should you modify? To answer, select the appropriate object in the answer area.
 clip_image001[32]
Answer:
 clip_image001[34]
Explanation:
http://technet.microsoft.com/en-us/library/cc771298(v=ws.10).aspx
Secure Socket Tunneling Protocol (SSTP) is a new tunneling protocol that uses the HTTPS protocol over TCP port 443 to pass traffic through firewalls and Web proxies that might block PPTP and L2TP/IPsec traffic.

QUESTION 182
Your network contains two Active Directory domains named contoso.com and adatum.com. The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. Server1 has a copy of the contoso.com DNS zone. You need to configure Server1 to resolve names in the adatum.com domain.
The solution must meet the following requirements:
– Prevent the need to change the configuration of the current name servers that host zones for adatum.com.
– Minimize Administrative effort.
Which type of zone should you create?

A.    Primary
B.    Secondary
C.    Reverse lookup
D.    Stub

Answer: D
Explanation:
A. When a zone that this DNS server hosts is a primary zone, the DNS server is the primary source for information about this zone, and it stores the master copy of zone data in a local file or in AD DS.
B. When a zone that this DNS server hosts is a secondary zone, this DNS server is a secondary source for information about this zone. The zone at this server must be obtained from another remote DNS server computer that also hosts the zone
C. clients use a known IP address and look up a computer name based on its address. A reverse lookup takes the form of a question, such as "Can you tell me the DNS name of the computer that uses the IP address 192.168.1.20?"
D. When a zone that this DNS server hosts is a stub zone, this DNS server is a source only for information about the authoritative name servers for this zone. The zone at this server must be obtained from another DNS server that hosts the zone.
– Prevents Change to current zone
http://technet.microsoft.com/en-us/library/cc771898.aspx
http://technet.microsoft.com/en-us/library/cc730980.aspx

QUESTION 183
Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed.
On Server1, you create a standard primary zone named contoso.com.
You need to ensure that Server2 can host a secondary zone for contoso.com.
What should you do from Server1?

A.    Add Server2 as a name server.
B.    Convert contoso.com to an Active Directory-integrated zone.
C.    Create a zone delegation that points to Server2.
D.    Create a trust anchor named Server2.

Answer: A
Explanation:
A. You must add a new Name Server. To add a name server to the list of authoritative servers for the zone, you must specify both the server’s IP address and its DNS name. When entering names, click Resolve to resolve the name to its IP address prior to adding it to the list.
B. Instead of adding standard secondary DNS servers, you can convert the server from a primary DNS server to an Active Directory Integrated Primary server and configure another domain controller to be a DNS server
C. You can divide your Domain Name System (DNS) namespace into one or more zones. You can delegate management of part of your namespace to another location or department in your organization by delegating the management of the corresponding zone.
http://technet.microsoft.com/en-us/library/cc770984.aspx
http://support.microsoft.com/kb/816101
http://technet.microsoft.com/en-us/library/cc753500.aspx
http://technet.microsoft.com/en-us/library/cc771640(v=ws.10).aspx http://technet.microsoft.com/en-us/library/ee649280(v=ws.10).aspx

QUESTION 184
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. On Server1, you create a network policy named Policy1.
You need to configure Policy1 to apply only to VPN connections that use the L2TP protocol.
What should you configure in Policy1?

A.    The Tunnel Type
B.    The Service Type
C.    The NAS Port Type
D.    The Framed Protocol

Answer: A
Explanation:
A. Restricts the policy to only clients that create a specific type of tunnel, such as PPTP or L2TP. B. Restricts the policy to only clients specifying a certain type of service, such as Telnet or Point to Point Protocol connections.
C. Allows you to specify the type of media used by the client computer to connect to the network. D. Restricts the policy to clients that specify a certain framing protocol for incoming packets, such as PPP or SLIP.
 clip_image001[36]
http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspx

QUESTION 185
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. All client computers run Windows 8 Enterprise. DC1 contains a Group Policy object (GPO) named GPO1.
You need to deploy a VPN connection to all users.
What should you configure from User Configuration in GPO1?

A.    Preferences/Control Panel Settings/Network Options
B.    Policies/Administrative Templates/Windows Components/Windows Mobility Center
C.    Policies/Administrative Templates/Network/Windows Connect Now
D.    Policies/Administrative Templates/Network/Network Connections

Answer: A
Explanation:
A. The Network Options extension allows you to centrally create, modify, and delete dial-up networking and virtual private network (VPN) connections. Before you create a network option preference item, you should review the behavior of each type of action possible with the extension. http://technet.microsoft.com/en-us/library/cc772449.aspx

QUESTION 186
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. All sales users have laptop computers that run Windows 8. The sales computers are joined to the domain. All user accounts for the sales department are in an organizational unit (OU) named Sales_OU. A Group Policy object (GPO) named GPO1 is linked to Sales_OU.
You need to configure a dial-up connection for all of the sales users.
What should you configure from User Configuration in GPO1?

A.    Policies/Administrative Templates/Network/Windows Connect Now
B.    Policies/Administrative Templates/Windows Components/Windows Mobility Center
C.    Preferences/Control Panel Settings/Network Options
D.    Policies/Administrative Templates/Network/Network Connections

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/cc772107.aspx

QUESTION 187
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-core processors and 16 GB of RAM.
You install the Hyper-V server role in Server1.
You plan to create two virtual machines on Server1.
You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously.
What should you configure on each virtual machine?

A.    Dynamic Memory
B.    NUMA topology
C.    Memory weight
D.    Ressource Control

Answer: A

QUESTION 188
Your network contains an Active Directory domain named corp.contoso.com. The domain contains a domain controller named DC1. When you run ping dcl.corp.contoso.com, you receive the result as shown in the exhibit. (Click the Exhibit button.)
 clip_image002[20]
You need to ensure that DC1 can respond to the Ping command.
Which rule should you modify? To answer, select the appropriate rule in the answer area.
 clip_image002[22]
Answer:
 clip_image002[24]

QUESTION 189
You have a server named Server1 that runs Windows Server 2012 R2.
You promote Server1 to domain controller.
You need to view the service location (SVR) records that Server1 registers on DNS.
What should you do on Server1?

A.    Open the Srv.sys file
B.    Open the Netlogon.dns file
C.    Run ipconfig/displaydns
D.    Run Get-DnsServerDiagnostics

Answer: B

QUESTION 190
Your company has a remote office that contains 600 client computers on a single subnet.
You need to select a subnet mask for the network that will support all of the client computers. The solution must minimize the number of unused addresses.
Which subnet mask should you select?

A.    255.255.252.0
B.    255.255.254.0
C.    255.255.255.0
D.    255.255.255.128

Answer: A
Passing Microsoft 70-411 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-411 Dump: http://www.braindump2go.com/70-411.html

Official 2014 Latest Microsoft 70-411 Exam Dump Free Download(171-180)!

QUESTION 171
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File and Storage Services server role, the DFS Namespace role service, and the DFS Replication role service installed. Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Server1 and Server2 are connected by using a high-speed LAN connection.
You need to minimize the amount of processor resources consumed by DFS Replication.
What should you do?

A.    Reduce the bandwidth usage.
B.    Disable Remote Differential Compression (RDC).
C.    Modify the staging quota.
D.    Modify the replication schedule.

Answer: B
Explanation:
Because disabling RDC can help conserve disk input/output (I/O) and CPU resources, you might want to disable RDC on a connection if the sending and receiving members are in a local area network (LAN), and bandwidth use is not a concern. However, in a LAN environment where bandwidth is contended, RDC can be beneficial when transferring large files.
Question tells it uses a high-speed LAN connection.
http://technet.microsoft.com/en-us/library/cc758825%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc754229.aspx

QUESTION 172
Your company has a main office and two branch offices. The main office is located in New York. The branch offices are located in Seattle and Chicago.
The network contains an Active Directory domain named contoso.com. An Active Directory site exists for each office. Active Directory site links exist between the main office and the branch offices. All servers run Windows Server 2012 R2.
The domain contains three file servers. The file servers are configured as shown in the following table.
 clip_image001[26]
You implement a Distributed File System (DFS) replication group named Rep1Group.
Rep1Group is used to replicate a folder on each file server. Rep1Group uses a hub and spoke topology. NYC-SVR1 is configured as the hub server.
You need to ensure that replication can occur if NYC-SVR1 fails.
What should you do?

A.    Create an Active Directory site link.
B.    Modify the properties of Rep1Group.
C.    Create an Active Directory site link bridge.
D.    Create a connection in Rep1lGroup.

Answer: D
Explanation:
http://faultbucket.ca/2012/08/fixing-a-dfsr-connection-problem/ http://faultbucket.ca/2012/08/fixing-a-dfsr-connection-problem/
http://technet.microsoft.com/en-us/library/cc771941.aspx

QUESTION 173
You have a server named Server1 that runs Windows Server 2012 R2. On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:\Logs.
You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB in size.
What should you configure?

A.    A File Server Resource Manager (FSRM) quota on the C:\Logs folder
B.    A File Server Resource Manager (FSRM) file screen on the C:\Logs folder
C.    A schedule for DCS1
D.    The Data Manager settings of DCS1

Answer: D
Explanation:
http://sourcedaddy.com/windows-7/using-data-manager-view-performance-data.html

QUESTION 174
Your domain has contains a Windows 8 computer name Computer1 using BitLocker. The E:\ drive is encrypted and currently locked.
You need to unlock the E:\ drive with the recovery key stored on C:\
What should you run?

A.    Unlock-BitLocker
B.    Suspend-BitLocker
C.    Enable-BitLockerAutoUnloc
D.    Disable-BitLocker

Answer: A
Explanation:
A. Restores access to data on a BitLocker volume.
http://technet.microsoft.com/en-us/library/jj649833(v=wps.620).aspx

QUESTION 175
Your network contains and active Directory domain named contoso.com. The doman contains a server named Server1 that runs Windows Server 2012 R2 A local account named Admin1 is a member of the Administrators group on Server1.
You need to generate an audit event whenever Admin1 is denied access to a file or folder.
What should you run?

A.    auditpol.exe /set /user:admin1 /category:"detailed tracking" /failure:enable
B.    auditpol.exe /set/user:admin1 /failure:enable
C.    auditpol.exe /resourcesacl /set /type:keyauditpol.exe /resourcesacl /set /type: /access:ga
D.    auditpol.exe /resourcesacl /set /type:file /user:admin1 /failure

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/ff625687.aspx
set a global resource SACL to audit successful and failed attempts by a user to perform generic read and write functions on files or folders:
auditpol /resourceSACL /set /type:File /user:MYDOMAINmyuser /success /failure /access:FRFW
http://technet.microsoft.com/en-us/library/ff625687%28v=ws.10%29.aspx Syntax
auditpol /resourceSACL
[/set /type:<resource> [/success] [/failure] /user:<user> [/access:<access flags>]] [/remove /type:<resource> /user:<user> [/type:<resource>]] [/clear [/type:<resource>]]
[/view [/user:<user>] [/type:<resource>]]
http://technet.microsoft.com/en-us/library/ff625687%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/ff625687%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/ff625687.aspx
http://technet.microsoft.com/en-us/library/ff625687%28v=ws.10%29.aspx

QUESTION 176
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2.
You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.)
 clip_image002[14]
You need to ensure that an entry is added to the event log whenever a local user account is created or deleted on Server1.
What should you do?

A.    In Servers GPO, modify the Advanced Audit Configuration settings.
B.    On Server1, attach a task to the security log.
C.    In Servers GPO, modify the Audit Policy settings.
D.    On Server1, attach a task to the system log.

Answer: A
Explanation:
When you use Advanced Audit Policy Configuration settings, you need to confirm that these settings are not overwritten by basic audit policy settings. The following procedure shows how to prevent conflicts by blocking the application of any basic audit policy settings.
Enabling Advanced Audit Policy Configuration
Basic and advanced audit policy configurations should not be mixed. As such, it’s best practice to enable Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings in Group Policy to make sure that basic auditing is disabled. The setting can be found under Computer Configuration\Policies\Security Settings\Local Policies\Security Options, and sets the SCENoApplyLegacyAuditPolicy registry key to prevent basic auditing being applied using Group Policy and the Local Security Policy MMC snap-in.
In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure can be tracked has increased to 53. Previously, there were nine basic auditing settings under Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. These 53 new settings allow you to select only the behaviors that you want to monitor and exclude audit results for behaviors that are of little or no concern to you, or behaviors that create an excessive number of log entries. In addition, because Windows 7 and Windows Server 2008 R2 security audit policy can be applied by using domain Group Policy, audit policy settings can be modified, tested, and deployed to selected users and groups with relative simplicity.
Audit Policy settings
Any changes to user account and resource permissions.
Any failed attempts for user logon.
Any failed attempts for resource access.
Any modification to the system files.
Advanced Audit Configuration SettingsAudit compliance with important business-related and security-related rules by tracking precisely defined activities, such as:
A group administrator has modified settings or data on servers that contain finance information.
An employee within a defined group has accessed an important file. The correct system access control list (SACL) is applied to every file and folder or registry key on a computer or file share as a verifiable safeguard against undetected access.
In Servers GPO, modify the Audit Policy settings – enabling audit account management setting will generate events about account creation, deletion and so on.
Advanced Audit Configuration SettingsAdvanced Audit Configuration Settings ->Audit Policy
-> Account Management -> Audit User Account Management
 clip_image001[28]
In Servers GPO, modify the Audit Policy settings – enabling audit account management setting will generate events about account creation, deletion and so on.
 clip_image002[16]
http://blogs.technet.com/b/abizerh/archive/2010/05/27/tracing-down-user-and-computer-account-deletion-in-active-directory.aspx
http://technet.microsoft.com/en-us/library/dd772623%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/jj852202(v=ws.10).aspx
http://www.petri.co.il/enable-advanced-audit-policy-configuration-windows-server.htm http://technet.microsoft.com/en-us/library/dd408940%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/dd408940%28v=ws.10%29.aspx#BKMK_step2

QUESTION 177
You have 3 server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table.
 clip_image001[30]
You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. What should you create?

A.    A storage pool on Disk 2 and Disk 3
B.    A mirrored volume on Disk 2 and Disk 3
C.    A storage pool on Disk 1 and Disk 3
D.    A mirrored volume on Disk l and Disk 4
E.    Raid 5 Volume out of Disks 1, 2 and 3

Answer: B
Explanation:
A. Storage pool can’t use Dynamic disk
B. Mirrored volume will be > 3Tb
C. Storage pool can’t use Dynamic disk
D. is impossible, we need 3Tb of disk space
E. Raid5 need to be on dynamic disk

QUESTION 178
Your network contains an Active Directory domain named contoso.com. The domain functional level is Windows Server 2008. All domain controllers run Windows Server 2008 R2.
The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a BitLocker Drive Encryption (BitLocker)-encrypted drive. Server1 uses a Trusted Platform Module (TPM) chip.
You enable the Turn on TPM backup to Active Directory Domain Services policy setting by using a Group Policy object (GPO).
You need to ensure that you can back up the BitLocker recovery information to Active Directory.
What should you do?

A.    Raise the forest functional level to Windows Server 2008 R2.
B.    Enable the Configure the level of TPM owner authorization information available to the operating
system policy setting and set the Operating system managed TPM authentication level to None.
C.    Add a BitLocker data recovery agent.
D.    Import the TpmSchemaExtension.ldf and TpmSchemaExtensionACLChanges.ldf schema extensions
to the Active Directory schema.

Answer: D
Explanation:
You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS). Recovery information includes the recovery password for each BitLocker-protected drive, the TPM owner password, and the information required to identify which computers and drives the recovery information applies to. Optionally, you can also save a package containing the actual keys used to encrypt the data as well as the recovery password required to access those keys.
Backing up recovery passwords for a BitLocker-protected drive allows administrators to recover the drive if it is locked. This ensures that encrypted data belonging to the enterprise can always be accessed by authorized users.
Backing up the TPM owner information for a computer allows administrators to locally and remotely configure the TPM security hardware on that computer. As an example, an administrator might want to reset the TPM to factory defaults when decommissioning or repurposing computers.
For Windows 8 a change to how the TPM owner authorization value is stored in AD DS was implemented in the AD DS schema.
The TPM owner authorization value is now stored in a separate object which is linked to the Computer object. This value was stored as a property in the Computer object itself for the default Windows Server 2008 R2 schemas. Windows Server 2012 domain controllers have the default schema to backup TPM owner authorization information in the separate object. If you are not upgrading your domain controller to Windows Server 2012 you need to extend the schema to support this change. If Active Directory backup of the TPM owner authorization value is enabled in a Windows Server 2008 R2 environment without extending the schema, the TPM provisioning will fail and the TPM will remain in a Not Ready state for computers running Windows 8.
 clip_image002[18]
http://technet.microsoft.com/en-us/library/dd875529%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/jj635854.aspx
http://technet.microsoft.com/en-us/library/jj679889.aspx

QUESTION 179
Your network contains an Active Directory domain named contoso.com. The domain contains a Web server named www.contoso.com. The Web server is available on the Internet.
You implement DirectAccess by using the default configuration.
You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.com.
Which settings should you configure in a Group Policy object (GPO)?

A.    Name Resolution Policy
B.    DNS Client
C.    Network Connections
D.    DirectAccess Client Experience Settings

Answer: A
Explanation:
For DirectAccess, the NRPT must be configured with the namespaces of your intranet with a leading dot (for example, .internal.contoso.com or .corp.contoso.com). For a DirectAccess client, any name request that matches one of these namespaces will be sent to the specified intranet Domain Name System (DNS) servers.
Include all intranet DNS namespaces that you want DirectAccess client computers to access. There are no command line methods for configuring NRPT rules. You must use Group Policy settings. To configure the NRPT through Group Policy, use the Group Policy add-in at Computer Configuration \Policies\Windows Settings\Name Resolution Policy in the Group Policy object for DirectAccess clients. You can create a new NRPT rule and edit or delete existing rules. For more information, see Configure the NRPT with Group Policy.

QUESTION 180
You have a DNS server named Server1. Server1 has a primary zone named contoso.com. Zone Aging/ Scavenging is configured for the contoso.com zone. One month ago, an Administrator removed a server named Server2 from the network.
You discover that a static resource record for Server2 is present in contoso.com. Resource records for decommissioned client computers are removed automatically from contoso.com.
You need to ensure that the static resource records for all of the servers are removed automatically from contoso.com.
What should you modify?

A.    The Security settings of the static resource records
B.    The Expires after value of contoso.com
C.    The Record time stamp value of the static resource records
D.    The time-to-live (TTL) value of the static resource records

Answer: C
Explanation:
C. reset and permit them to use a current (non-zero) time stamp value. This enables these records to become aged and scavenged.
D. For most resource records, this field is optional. It indicates a length of time used by other DNS servers to determine how long to cache information for a record before expiring and discarding it.
http://technet.microsoft.com/en-us/library/cc771677.aspx http://technet.microsoft.com/en-us/library/cc758321(v=ws.10).aspx

Passing Microsoft 70-411 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-411 Dump: http://www.braindump2go.com/70-411.html

Official 2014 Latest Microsoft 70-411 Exam Dump Free Download(161-170)!

QUESTION 161
Your network contains an Active Directory domain named contoso.com. The domain does not contain a certification authority (CA). All servers run Windows Server 2012 R2. All client computers run Windows 8.
You need to add a data recovery agent for the Encrypting File System (EFS) to the domain.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    From Windows PowerShell, run Get-Certificate.
B.    From the Default Domain Controllers Policy, select Create Data Recovery Agent.
C.    From the Default Domain Policy, select Add Data Recovery Agent.
D.    From a command prompt, run cipher.exe.
E.    From the Default Domain Policy, select Create Data Recovery Agent.
F.    From the Default Domain Controllers Policy, select Add Data Recovery Agent.

Answer: AC
Explanation:
A. Submits a certificate request to an enrollment server and installs the response or retrieves a certificate for a previously submitted request.
C. Add agent to default domain policy
http://technet.microsoft.com/en-us/library/hh848632(v=wps.620).aspx http://technet.microsoft.com/en-us/library/dd875560(v=ws.10).aspx#BKMK_proc_dra http://windowsitpro.com/systems-management/how-can-i-add-user-efs-recovery-agent-domain

QUESTION 162
Your network contains an Active Directory domain named contoso.com. The domain contains three domain controllers.
 clip_image001[16]
You are creating a Distributed File System (DFS) namespace as shown in the exhibit. (Click the Exhibit button.)
 clip_image002[12]
You need to identify which configuration prevents you from creating a DFS namespace in Windows Server 2008 mode.
Which configuration should you identify?

A.    The location of the PDC emulator role
B.    The functional level of the domain
C.    The operating system on Server1 and Server3
D.    The location of the RID master role

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/ff633469(v=WS.10).aspx
Migrate the following domain-based namespace from Windows 2000 Server mode to Windows Server 2008 mode.

QUESTION 163
Your network contains an Active Directory domain named adatum.com. The domain contains five servers. The servers are configured as shown in the following table.
 clip_image001[18]
All desktop computers in adatum.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives.
You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network.
To which server should you deploy the feature?

A.    Server3
B.    Server1
C.    DC2
D.    Server2
E.    DC1

Answer: B
Explanation:
The BitLocker-NetworkUnlock feature must be installed on a Windows Deployment Server (which does not have to be configured–the WDSServer service just needs to be running). http://technet.microsoft.com/en-us/library/jj574173.aspx

QUESTION 164
Your network contains multiple Active Directory sites.
You have a Distributed File System (DFS) namespace that has a folder target in each site.
You discover that some client computers connect to DFS targets in other sites.
You need to ensure that the client computers only connect to a DFS target in their respective site.
What should you modify?

A.    The properties of the Active Directory sites
B.    The properties of the Active Directory site links
C.    The delegation settings of the namespace
D.    The referral settings of the namespace

Answer: D
Explanation:
A. A site is a set of well-connected subnets.
B. To control which sites replicate directly with each other
C. Determines the users and groups granted permissions to manage the replication group
D. A referral is an ordered list of servers that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or DFS folder with targets. After the computer receives the referral, the computer attempts to access the first server in the list. If the server is not available, the client computer attempts to access the next server. If a server becomes unavailable, you can configure clients to fail back to the preferred server after it becomes available.
http://www.windowsnetworking.com/articles_tutorials/Configuring-DFS-Namespaces.html http://technet.microsoft.com/en-us/library/cc794914(v=ws.10).aspx

QUESTION 165
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. Server1 has a folder named Folder1 that is used by the sales department.
You need to ensure that an email notification is sent to the sales manager when a File Screening Audit report is generated.
What should you configure on Server1?

A.    A file screen exception
B.    A file group
C.    A storage report task
D.    A file screen

Answer: C
Explanation:
A. A file screen exception is a special type of file screen that overrides any file screening that would otherwise apply to a folder and all its subfolders in a designated exception path. That is, it creates an exception to any rules derived from a parent folder.
B. A file group is used to define a namespace for a file screen, file screen exception, or Files by File Group storage report.
C. file screening report will identify individuals or applications that violate file screening policy, To set e-mail notifications and certain reporting capabilities, you must first configure the general File Server Resource Manager options.
D. Control the types of files that users can save
http://technet.microsoft.com/en-us/library/cc730822.aspx
http://technet.microsoft.com/en-us/library/cc770594.aspx
http://technet.microsoft.com/en-us/library/cc771212.aspx
http://technet.microsoft.com/en-us/library/cc732074.aspx
http://technet.microsoft.com/en-us/library/cc755988.aspx

QUESTION 166
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the File Server Resource Manager role service installed.
You configure a quota threshold as shown in the exhibit. (Click the Exhibit button.)
 clip_image001[20]
You need to ensure that a user named User1 receives an email notification when the threshold is exceeded.
What should you do?

A.    Configure the File Server Resource Manager Options.
B.    Modify the members of the Performance Log Users group.
C.    Create a performance counter alert.
D.    Create a classification rule.

Answer: A
Explanation:
A. When you create quotas and file screens, you have the option of sending e-mail notifications to users when their quota limit is approaching or after they have attempted to save files that have been blocked
B. Members of this group can manage performance counters, logs and alerts on the server locally and from remote clients without being a member of the Administrators group.
C. You can set an alert on a counter, thereby defining that a message be sent, a program be run, an entry made to the application event log, or a log be started when the selected counter’s value exceeds or falls below a specified setting.
D. File Classification Infrastructure provides insight into your data by automating classification processes so that you can manage your data more effectively. You can classify files and apply policies based on this classification. Example policies include dynamic access control for restricting access to files, file encryption, and file expiration. Files can be classified automatically by using file classification rules or manually by modifying the properties of a selected file or folder. http://technet.microsoft.com/en-us/library/cc756031(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc785098(v=ws.10).aspx http://technet.microsoft.com/en-us/library/bb490759.aspx
http://technet.microsoft.com/en-us/library/hh831701.aspx

QUESTION 167
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File and Storage Services server role. The DFS Namespaces role service, and the DFS Replication role service installed. Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Server1 and Server2 are separated by a low-speed WAN connection.
You need to limit the amount of bandwidth that DFS can use to replicate between Server1 and Server2.
What should you modify?

A.    The referral ordering of the namespace
B.    The cache duration of the namespace
C.    The schedule of the replication group
D.    The staging quota of the replicated folder

Answer: C
Explanation:
A. A referral is an ordered list of targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or folder with targets in the namespace. You can adjust how long clients cache a referral before requesting a new one.
B. DFS Replication uses staging folders for each replicated folder to act as caches for new and changed files that are ready to be replicated from sending members to receiving members.
C. A referral is an ordered list of targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or folder with targets. After the client receives the referral, the client attempts to access the first target in the list. If the target is not available, the client attempts to access the next target.
D. Scheduling allows less bandwidth the by limiting the time interval of the replication
http://technet.microsoft.com/en-us/library/cc771251.aspx
http://technet.microsoft.com/en-us/library/cc754229.aspx
http://technet.microsoft.com/en-us/library/cc732414.aspx
http://technet.microsoft.com/en-us/library/cc753923.aspx

QUESTION 168
Your network contains an Active Directory domain named adatum.com. The domain contains five servers. The servers are configured as shown in the following table.
 clip_image001[22]
All desktop computers in adatum.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives.
You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network.
To which server should you deploy the feature

A.    DC1
B.    DC2
C.    Server1
D.    Server2

Answer: C
Explanation:
The BitLocker-NetworkUnlock feature must be installed on a Windows Deployment Server (which does not have to be configured–the WDSServer service just needs to be running). http://technet.microsoft.com/en-us/library/jj574173.aspx

QUESTION 169
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2.
You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.)
 clip_image001[24]
On Server1, you have a folder named C:\Share1 that is shared as Share1. Share1 contains confidential data. A group named Group1 has full control of the content in Share1.
You need to ensure that an entry is added to the event log whenever a member of Group1 deletes a file in Share1.
What should you configure?

A.    The Audit File System setting of Servers GPO
B.    The Sharing settings of C:\Share1
C.    The Security settings of C:\Share1
D.    The Audit File Share setting of Servers GPO

Answer: C
Explanation:
C. Access to objects, such as files and folders can be audited using the advanced security setting auditing tab on Share1 and adding Group1 and selecting the delete check box http://technet.microsoft.com/en-us/library/cc753927(v=ws.10).aspx http://social.technet.microsoft.com/Forums/en-US/winservergen/thread/13779c78-0c73-4477- 8014-f2eb10f3f10f/

QUESTION 170
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. Server1 has a folder named Folder1 that is used by the human resources department.
You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1.
What should you configure on Server1?

A.    A file screen
B.    A file screen exception
C.    A file group
D.    A storage report task

Answer: A
Explanation:
A. Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files
B. A file screen exception is a special type of file screen that overrides any file screening that would otherwise apply to a folder and all its subfolders in a designated exception path. That is, it creates an exception to any rules derived from a parent folder.
C. File are a group of file classified by extension (i.e. Images: ,jpg, .gif, etc..)
D. Create reports based on file use
http://technet.microsoft.com/en-us/library/cc732074.aspx http://technet.microsoft.com/en-us/library/cc730822.aspx http://technet.microsoft.com/en-us/library/cc755988(v=ws.10).aspx

Passing Microsoft 70-411 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-411 Dump: http://www.braindump2go.com/70-411.html

Official 2014 Latest Microsoft 70-411 Exam Dump Free Download(151-160)!

QUESTION 151
You have a server named Server1 that runs Windows Server 2012 R2.
You create a Data Collector Set (DCS) named DCS1.
You need to configure DCS1 to log data to D:\logs.
What should you do?

A.    Right-click DCS1 and click Properties.
B.    Right-click DCS1 and click Save template…
C.    Right-click DCS1 and click Data Manager…
D.    Right-click DCS1 and click Export list…

Answer: A

QUESTION 152
You have a server named WSUS1 that runs Windows Server 2012 R2. WSUS1 has the Windows Server Update Services server role installed and has one volume. You add a new hard disk to WSUS1 and then create a volume on the hard disk. You need to ensure that the Windows Server Update Services (WSUS) update files are stored on the new volume. What should you do?

A.    From a command prompt, run wsusutil.exe and specify the movecontent parameter.
B.    From the Update Services console, run the Windows Server Update Services Configuration Wizard.
C.    From the Update Services console, configure the Update Files and Languages option.
D.    From a command prompt, run wsusutil.exe and specify the export parameter.

Answer: A
Explanation:
A. configuration wizard will be run immediately after installation or at a later time. If you want to change the configuration later, you run WSUS Server Configuration Wizard from the Options page of the WSUS 3.0 Administration console
B. Changes the file system location where the WSUS server stores update files, and optionally copies any update files from the old location to the new location
C. The export command enables you to export update metadata to an export package file. You cannot use this parameter to export update files, update approvals, or server settings.
D. Allows you to specify where store downloaded update file, will not move already downloaded updates
http://technet.microsoft.com/en-us/library/cc720475(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc708480(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc720466(v=ws.10).aspx

QUESTION 153
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8 Pro.
You have a Group Policy object (GPO) named GP1. GP1 is linked to the domain. GP1 contains the Windows Internet Explorer 10 and 11 Internet Settings. The settings are shown in the exhibit. (Click the Exhibit button.) Users report that when they open Windows Internet Explorer, the home page is NOT set to http:// www.contoso.com.
You need to ensure that the home page is set to http://www.contoso.com the next time users log on to the domain.
What should you do?
 clip_image001[6]

A.    On each client computer, run gpupdate.exe.
B.    Open the Internet Explorer 10 and 11 Internet Settings, and then press F5.
C.    Open the Internet Explorer 10 and 11 Internet Settings, and then modify the Tabs settings.
D.    On each client computer, run Invoke-GPupdate.

Answer: B
Explanation:
You can use Group Policy Preferences to manage Internet Explorer 10.
 clip_image001[8]
Enabling and disabling settings with F5 – F8
As you can see, the tabs are exactly the same as in Internet Explorer, but with added green and dotted red lines underneath individual settings or red and green circles in front of individual settings:
Settings with green lines underneath them or green circles in front of them get applied.
Settings with red lines underneath them or red circles in front of them do not get applied.
You can change theses statuses with the F5, F6, F7 and F8 buttons. With F5 you can enable all settings on a tab, while F6 only enables the specific setting you edited last. F8 disables all settings on a tab, while F7 only disables the specific setting you edited last. Press OK when done configuring settings.
http://4sysops.com/archives/internet-explorer-10-administration-part-3-group-policy-preferences/

QUESTION 154
Your network contains an Active Directory domain named contoso.com. The domain does not contain a certification authority (CA). All servers run Windows Server 2012 R2. All client computers run Windows 8.
You need to add a data recovery agent for the Encrypting File System (EFS) to the domain.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two).

A.    From the Default Domain Controllers policy, select Create Data Recovery Agent.
B.    From the Default Domain Controllers policy, select Add Data Recovery Agent.
C.    From Windows PowerShell, run Get-Certificate.
D.    From the Default Domain Policy, select Add Data Recovery Agent.
E.    From a command prompt, run cipher.exe.
F.    From the Default Domain Policy, select Create Data Recovery Agent.

Answer: CD
Explanation:
http://technet.microsoft.com/en-us/library/cc778448(v=ws.10).aspx

QUESTION 155
Your network contains multiple Active Directory sites.
You have a Distributed File System (DFS) namespace that has a folder target in each site.
You discover that some client computers connect to DFS targets in other sites.
You need to ensure that the client computers only connect to a DFS target in their respective site.
What should you modify?

A.    the properties of the Active Directory site links.
B.    the properties of the Active Directory sites.
C.    the delegation settings of the namespace
D.    the referral settings of the namespace

Answer: D

QUESTION 156
Your network contains an Active Directory domain named contoso.com.
You have a failover cluster named Cluster1. All of the nodes in Cluster1 have BitLocker Drive Encryption (BitLocker) installed.
You plan to add a new volume to the shared storage of Cluster1.
You need to add the new volume to the shared storage. The solution must meet the following requirements:
– Encrypt the volume.
– Avoid using maintenance mode on the cluster.
Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 clip_image002
Answer:
 clip_image002[4]
Explanation:
http://technet.microsoft.com/en-us/library/jj649829.aspx

QUESTION 157
Your network contains an Active Directory domain named contoso.com. The domain functional level in Windows Server 2008. All domain controllers run Windows Server 2008 R2. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a BitLocker Drive Encryption (BitLocker)-encrypted drive. Server1 uses a trusted Platform Module (TPM) chip.
You enable the Turn on TPM backup to Active Directory Domain Services policy setting by using a Group Policy object (GPO).
You need to ensure that you can back up the BitLocker recovery information to Active Directory.
What should you do?

A.    Upgrade a domain controller to Windows 2012.
B.    Enable the Store BitLocker recovery information in the Active Directory Services (Windows Server2008
and Windows Vista) policy settings.
C.    Raise the forest functional level to Windows 2008 R2.
D.    Add a BitLocker data recovery agent

Answer: B
Explanation:
B. You should also configure AD DS before configuring BitLocker on client computers. If BitLocker is enabled first, recovery information for those computers will not be automatically added to AD DS. If necessary, recovery information can be backed up to AD DS after BitLocker has been enabled by using either the Manage-bde command-line tool or the BitLocker Windows Management Instrumentation (WMI) provider.
http://technet.microsoft.com/en-us/library/dd875529(v=ws.10).aspx

QUESTION 158
Your company has a main office and a branch office. The main office is located in Seattle. The branch office is located in Montreal. Each office is configured as an Active Directory site. The network contains an Active Directory domain named adatum.com. The Seattle office contains a file server named Server1. The Montreal office contains a file server named Server2. The servers run Windows Server 2012 R2 and have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed. Server1 and Server2 each have a share named Share1 that is replicated by using DFS Replication.
You need to ensure that users connect to the replicated folder in their respective office when they connect to \\contoso.com\Share1.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A.    Create a replication connection.
B.    Create a namespace.
C.    Share and publish the replicated folder.
D.    Create a new topology.
E.    Modify the Referrals settings.

Answer: BCE
Explanation:
To share a replicated folder and publish it to a DFS namespace Click Start, point to Administrative Tools, and then click DFS Management. In the console tree, under the Replication node, click the replication group that contains the replicated folder you want to share. In the details pane, on the Replicated Folders tab, right-click the replicated folder that you want to share, and then click Share and Publish in Namespace. In the Share and Publish Replicated Folder Wizard, click Share and publish the replicated folder in a namespace, and then follow the steps in the wizard.
Note that: If you do not have an existing namespace, you can create one in the Namespace Path page in the Share and Publish Replicated Folder Wizard. To create the namespace, in the Namespace Path page, click Browse, and then click New Namespace.
To create a namespace
Click Start, point to Administrative Tools, and then click DFS Management.
In the console tree, right-click the Namespaces node, and then click New Namespace. Follow the instructions in the New Namespace Wizard.
To create a stand-alone namespace on a failover cluster, specify the name of a clustered file server instance on the Namespace Server page of the New Namespace Wizard.
Important
Do not attempt to create a domain-based namespace using the Windows Server 2008 mode unless the forest functional level is Windows Server 2003 or higher. Doing so can result in a namespace for which you cannot delete DFS folders, yielding the following error message: "The folder cannot be deleted. Cannot complete this function."
http://technet.microsoft.com/en-us/library/cc731531.aspx
http://technet.microsoft.com/en-us/library/cc772778%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/cc732414.aspx
http://technet.microsoft.com/en-us/library/cc772379.aspx
http://technet.microsoft.com/en-us/library/cc732863%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/cc725830.aspx
http://technet.microsoft.com/en-us/library/cc771978.aspx

QUESTION 159
You have a server named Server1 that runs Windows Server 2012 R2. An administrator creates a quota as shown in the Quota exhibit. (Click the Exhibit button.)
 clip_image002[6]
You run the dir command as shown in the Dir exhibit. (Click the Exhibit button.)
 clip_image001[10]
You need to ensure that D:\Folder1 can only consume 100 MB of disk space.
What should you do?

A.    From File Server Resource Manager, edit the existing quota.
B.    From the properties of drive D, enable quota management.
C.    From the Services console, set the Startup Type of the Optimize drives service to Automatic.
D.    From File Server Resource Manager, create a new quota.

Answer: D
Explanation:
Create a new Quota on path, without using the auto apply template and create quota on existing and new subfolders.

 clip_image002[8]
 clip_image002[10]
 clip_image001[12]
http://technet.microsoft.com/en-us/library/cc755603(v=ws.10).aspx

QUESTION 160
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains an organizational unit (OU) named FileServers_OU. FileServers_OU contains the computer accounts for all of the file servers in the domain.
You need to audit the users who successfully access shares on the file servers.
Which audit category should you configure? To answer, select the appropriate category in the answer area.
 clip_image001[14]
Answer:
 clip_image002
Explanation:
http://technet.microsoft.com/en-us/library/hh831382.aspx
http://technet.microsoft.com/en-us/library/cc766468(v=ws.10).aspx

Passing Microsoft 70-411 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-411 Dump: http://www.braindump2go.com/70-411.html

Official 2014 Latest Microsoft 70-411 Exam Dump Free Download(141-150)!

QUESTION 141
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Server Update Services roll installed. Server1 stores update files locally in C:\Updates.
You need to change the location in which the updates files are stored to D:\Updates
What should you do?

A.    From the Update Services Console, run the Windows Server Update Services Configuration Wizard
B.    From the command prompt, run wsusutil.exe and specify the movecontent parameter
C.    From the command prompt, run wsusutil.exe and specify the export parameter
D.    From the Update Services Console, configure the update Files and Languages option

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc720466(v=ws.10).aspx

QUESTION 142
You have Site1 with 400 desktops and Site2 with 150 desktops.
You have a WSUS Server to deploy updates for both sites.
You need to make sure that all computers in the same site will have the same updates.
What should you configure?

A.    Computer Groups
B.    Security Groups
C.    Synchronization Options
D.    Classifications

Answer: A
Explanation:
A. WSUS allows you to target updates to groups of client computers, so you can ensure that specific computers always get the right updates at the most convenient times. For example, if all the computers in one department (such as the Accounting team) have a specific configuration, you can set up a group for that team, decide which updates their computers need and what time they should be installed, and then use WSUS reports to evaluate the updates for the team.
http://technet.microsoft.com/en-us/library/hh328559(v=ws.10).aspx

QUESTION 143
You have a WDS server named Server1 on Windows Server 2012 R2.
You need to automate the WDS deployment.
Which Tab should you configure?

A.    Boot Properties
B.    Client Properties
C.    Network Settings
D.    PXE Response Settings

Answer: B
Explanation:
B. On the Client tab, select Enable unattended installation, browse to the appropriate unattend file, and then click Open.
http://technet.microsoft.com/en-us/library/dd637990(v=ws.10).aspx
 clip_image001

QUESTION 144
Which parameter do you need to use to import GUID and MAC address?

A.    /get-AutoAddDevices
B.    /get-Device
C.    /add
D.    /enable

Answer: B
Explanation:
wdsutil /get-device /id:01-23-45-67-89-AB
wdsutil /get-device /id:0123456789AB

QUESTION 145
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 and has the Windows Deployment Services (WDS) server role installed.
You need to use WDS to deploy an image to a client computer that does not support PXE.
Which type of image should you use to start the computer?

A.    boot
B.    install
C.    discovery
D.    capture

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/dd637996(v=ws.10).aspx
WDSUTIL /New-DiscoverImage /Image:<name> /Architecture:{x86|x64|ia64} . To specify whichserver the
/DestinationImage /FilePath:<path and name to new file>
discover image connects to, append /WDSServer:<server nameor IP>.
 clip_image001[4]

QUESTION 146
You are a admin (what a suprise huh?) you have wsus with 2 sites wich contain computers. you want to have the ability to update the computers per site or together. wich 3 steps do you do?

A.    Create computer groups in wsus
B.    Create synchronization options
C.    Create GPO and configure updates
D.    Under Tasks, click Synchronize now

Answer: ABC
Explanation:
http://technet.microsoft.com/en-us/library/hh852346.aspx
http://technet.microsoft.com/es-es/library/cc708455(v=ws.10).aspx

QUESTION 147
Which of the options should you configure for a WDS pre-staged computer name? You should select 2 of the 4 check boxes.

A.    GUID
B.    WdsClientUnattend
C.    MAC-address preceding with nulls
D.    ReferralServer

Answer: AC
http://technet.microsoft.com/en-us/library/cc754469.aspx

QUESTION 148
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008 R2.
You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs).
You attach a new VHD to Server1.
You need to install Windows Server 2102 R2 in the VHD.
What should you do?

A.    Run dism.exe and specify the /apply-image parameter.
B.    Run dism.exe and specify the /append-image parameter.
C.    Run imagex.exe and specify the /export parameter.
D.    Run imagex.exe and specify the /append parameter.

Answer: A

QUESTION 149
You have a server named Admin1 that runs Windows Server 2012 R2.
On Admin1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:\Logs.
You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB in size.
What should you configure?

A.    A File Server Resource Manager (FSRM) quota on the C:\Logs folder
B.    A File Server Resource Manager (FSRM) file screen on the C:\Logs folder
C.    A schedule for DCS1
D.    The Data Manager settings of DCS1

Answer: D
Explanation:
http://sourcedaddy.com/windows-7/using-data-manager-view-performance-data.html

QUESTION 150
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that has the File Services server role installed.
You install the Windows Deployment Services server role on Server1.
You plan to use Server2 as a reference computer.
You need to create an image of Server2 by using Windows Deployment Services.
Which type of image should you add to Server1 first?

A.    Boot
B.    Discovery
C.    Install
D.    Capture

Answer: A
Explanation:
A. Configure the server and add the default images (Install.wim and Boot.wim) that are included on the installation media (in the \Sources folder).
B. A type of boot image that you can use to install an operating system on a computer that is not Pre-Boot Execution Environment (PXE) enabled. When you boot a computer into a discover image, a Windows Deployment Services server will be located, and then you can choose the install image you want to install.
C. The operating system image that you deploy to the client computer. To create install images using Windows Deployment Services, you must first create a capture image.
D. A type of boot image that you boot a client computer into to capture the operating system as a .wim file.
You must first create a capture image when you are creating custom install images. http://technet.microsoft.com/en-us/library/cc730907(v=ws.10).aspx http://technet.microsoft.com/en-us/library/jj648426.aspx http://itadmi
ntips.wordpress.com/2011/05/19/wds-setup-guide-part-2-boot-image-setup/
Passing Microsoft 70-411 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-411 Dump: http://www.braindump2go.com/70-411.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(321-330)!

QUESTION 321
You have a server named Server1 that runs Windows Server 2012 R2. On Server1, you open Computer Management as shown in the exhibit. (Click the Exhibit button.)

 clip_image001
You need to ensure that you can create a 3-TB volume on Disk 1. What should you do first?

A.    Create a storage pool.
B.    Convert the disk to a GPT disk.
C.    Create a VHD, and then attach the VHD.
D.    Convert the disk to a dynamic disk.

Answer: B
Explanation:
 clip_image001[4]

QUESTION 322
You have 3 server named Server1. Server1 runs a Server Core installation of Windows Server 2012 R2. The local area connection on Server1 has the following configuration:
IP address: 10.1.1.1
– Subnet mask: 255.255.240.0
– Default gateway: 10.1.1.254
– Preferred DNS server: <none>
The network contains a DNS server that has an IPv4 address of 10.1.1.200. You need to configure Server1 to use 10.1.1.200 as the preferred DNS server. The solution must not change any other settings on Server1.
Which command should you run?

A.    sconfig.cmd
B.    net.exe
C.    Set-NetIPInterface
D.    netsh.exe

Answer: A
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. Network settings You can configure the IP address to be assigned automatically by a DHCP Server or you can assign a static IP address manually. This option allows you to configure DNS Server settings for the server as well.
 clip_image001[6]
Sconfig.cmd interface

QUESTION 323
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
L2P.com has a domain controller, named L2P-DC01. You have been instructed to make sure that the Group Policy Administrative Templates are available centrally.
Which of the following actions should you take?

A.    You should consider copying the policies folder to the PolicyDefinitions folder in the L2P.com
domain’s SYSVOL folder.
B.    You should consider copying the PolicyDefinitions folder to the policies folder in the L2P.com
domain’s SYSVOL folder.
C.    You should consider copying the PolicyDefinitions folder to the policies folder in the L2P.com
domain’s systemroot folder.
D.    You should consider copying the PolicyDefinitions folder to the policies folder in the L2P.com
    domain’s logonserver folder.

Answer: B
Explanation:
PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory, they are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy Management Console in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additional source of ADMX files, and will report them accordingly when setting your policies.
By default, the folder is not created. Whether you are a single DC or several thousand, I would strongly recommend you create a Central Store and start using it for all your ADMX file storage. It really does work well.
The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain.
To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in the following location: \\FQDN\SYSVOL\FQDN\policies
Note: FQDN is a fully qualified domain name.
http://tigermatt.wordpress.com/tag/policydefinitions/
http://support.microsoft.com/kb/929841/en-us
http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/ http://support.microsoft.com/kb/2741591/en-us

QUESTION 324
Your network contains an Active Directory domain named contoso.com. The password policy for the domain is set to require a minimum password length of 10 characters. A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. You need to identify what forces the two users to have different password lengths.
Which tool should you use?

A.    Credential Manager
B.    Security Configuration Wizard (SCW)
C.    Group Policy Management
D.    Active Directory Administrative Center

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx
In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources.
 clip_image001[8]
 clip_image001[10]

 

QUESTION 325
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
L2P.com has a Hyper-V server, named L2P-SR13, which hosts multiple virtual machines.
You have enabled the use of Single-root I/O virtualization.
Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.)

A.    It maximizes network throughput, while minimizing network latency.
B.    It maximizes network throughput, as well as network latency.
C.    It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.
D.    It prevents the virtual machine from accessing the network switch directly.

Answer: AC
Explanation:
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V
virtualizationstack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments.
http://msdn.microsoft.com/en-us/library/windows/hardware/hh440148%28v=vs.85%29.aspx

QUESTION 326
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory Architecture (NUMA).
Which of the following is TRUE with regards to Non-Uniform Memory Architecture (NUMA)? (Choose two.)

A.    It is a computer architecture used in multiprocessor systems.
B.    It is a computer architecture used in single processor systems.
C.    It allows a processor to access local memory faster than it can access remote memory.
D.    It allows a processor to access remote memory faster than it can access local memory.

Answer: AC
Explanation:
NUMA is a hardware design feature that divides CPUs and memory in a physical server into NUMA nodes. You get the best performance when a process uses memory and CPU from within the same NUMA node.
de is full, then it’ll get memory from
When a process requires more memory, but the current NUMA no
another NUMA node and that comes at a performance cost to that process, and possibly all other processes on that physical server.
And that’s why virtualization engineers need to be aware of this. In Hyper-V we have Dynamic Memory.
Non-Uniform Memory Access or Non-Uniform Memory Architecture (NUMA) is a computer memory design used in multiprocessors, where the memory access time depends on the memory location relative to a processor. Under ccNUMA, a processor can access its own local memory faster than non-local memory, that is, memory local to another processor or memory shared between processors. NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures.
http://en.wikipedia.org/wiki/Non-Uniform_Memory_Access
http://www.aidanfinn.com/?p=11945

QUESTION 327
Hotspot Question
You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not ave access to the Internet. All roles are removed completely from DHCP1. You mount a Windows Server 2012 R2 installation image to the C:\Mount folder. You need to install the DHCP Server server role on DHCP1 by using Server Manager. Which folder should you specify as the alternate path for the source files?To answer, select the appropriate folder in the answer area.
 clip_image001[12]
Answer:
 clip_image001[14]

QUESTION 328
You have a server named Data1 that runs a Server Core Installation of Windows Server 2012  R2 Standard. You need to configure Data1 to run a Server Core Installation of Windows Server 2012  R2 Enterprise. You want to achieve this goal by using the minimum amount of administrative effort.
What should you perform?

A.    a clean installation of Windows Server 2012
B.    an offline servicing by using Dism
C.    an online servicing by using Dism
D.    an upgrade installation of Windows Server 2012

Answer: C
Explanation:
ROD: windows server 2012 enterprise DOES NOT EXIST, maybe they meant data center?
http://technet.microsoft.com/en-us/library/hh825157.aspx

QUESTION 329
You have a server named Server1 that runs Windows Server 2012 R2. You need to enable access-based enumeration for a file share on Server1. Which tool should you use?

A.    File Server Resource Manager (FSRM)
B.    File Explorer
C.    Share and Storage Management
D.    Server Manager

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/dd772681(v=WS.10).aspx
Access-based enumeration displays only the files and folders that a user has permissions to access. It is a feature that was previously available as a downloadable package for the Windows Server® 2003 operating system (it was also included in Windows Server 2003 Service Pack 1). Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management.
 clip_image001[16]
 

QUESTION 330
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You plan to create a shared folder. The shared folder will have a quota limit. You discover that when you run the New Share Wizard, you cannot select the SMB Share – Advanced option. You need to ensure that you can use SMB Share – Advanced to create the new share. What should you do on Server1 before you run the New Share Wizard?

A.    Run the Set-SmbSharecmdlet.
B.    Install the File Server Resource Manager role service.
C.    Configure Dynamic Access Control and App1y a central access policy.
D.    Configure the Advanced system settings.

Answer: B
Explanation:
 clip_image002

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(311-320)!

QUESTION 311
Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. A two-way forest trust exists between the forests. The forests use the address spaces shown in the following table.
 clip_image001[42]
From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the contoso.com domain, but you cannot perform reverse lookups for the servers in the adatum.com domain. From a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains. You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the computers in the contoso.com domain. What should you create?

A.    a delegation
B.    a trust point
C.    a conditional forwarder
D.    a GlobalNames zone

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/cc757172(v=ws.10).aspx
Conditional forwarders are DNS servers that only forward queries for specific domain names. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Forwarding according to domain names improves conventional forwarding by adding a name-based condition to the forwarding process.
The conditional forwarder setting for a DNS server consists of the following:
The domain names for which the DNS server will forward queries.
One or more DNS server IP addresses for each domain name specified.
When a DNS client or server performs a query operation against a DNS server, the DNS server looks to see if the query can be resolved using its own zone data or the data stored in its cache. If the DNS server is configured to forward for the domain name designated in the query, then the query is forwarded to the IP address of a forwarder associated with the domain name. For example, in the following figure, each of the queries for the domain names is forwarded to a DNS server associated with the domain name.

QUESTION 312
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server2 establishes an IPSec connection to Server1. You need to view which authentication method was used to establish the initial IPSec connection. What should you do?

A.    From Windows Firewall with Advanced Security, view the quick mode security association.
B.    From Event Viewer, search the Application Log for events that have an ID of 1704.
C.    From Event Viewer, search the Security Log for events that have an ID of 4672.
D.    From Windows Firewall with Advanced Security, view the main mode security association.

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/dd448497(v=ws.10).aspx
Main mode negotiation establishes a secure channel between two computers by determining a set of cryptographic protection suites, exchanging keying material to establish a shared secret key, and authenticating computer and user identities. A security association (SA) is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA.
To get to this view
In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, expand Security Associations, and then click Main Mode.
The following information is available in the table view of all main mode SAs. To see the information for a single main mode SA, double-click the SA in the list.
Main mode SA information
You can add, remove, reorder, and sort by these columns in the Results pane:
Local Address: The local computer IP address.
Remote Address: The remote computer or peer IP address.
1st Authentication Method: The authentication method used to create the SA.
1st Authentication Local ID:: The authenticated identity of the local computer used in first authentication.
1st Authentication Remote ID: The authenticated identity of the remote computer used in first authentication.
2nd Authentication Method: The authentication method used in the SA.
2nd Authentication Local ID:: The authenticated identity of the local computer used in second authentication.
2nd Authentication Remote ID: The authenticated identity of the remote computer used in second authentication.
Encryption: The encryption method used by the SA to secure quick mode key exchanges.
Integrity: The data integrity method used by the SA to secure quick mode key exchanges.
Key Exchange: The Diffie-Hellman group used to create the main mode SA.

QUESTION 313
Hotspot Question
You have a Group Policy object (GPO) named Server Audit Policy. The settings of the GPO are shown in the Settings exhibit. (Click the Exhibit button.)
 clip_image001[44]
The scope of the GPO is shown in the Scope exhibit. (Click the Exhibit button.)

 clip_image002[24]
The domain contains a group named Group1. The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.)
 clip_image001[46]
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
 clip_image001[48]
Answer:
 clip_image001[50]

QUESTION 314
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GPO1 that contains several user settings. GPO1 is linked to an organizational unit (OU) named OU1. The help desk reports that GPO1App1ies to only some of the users in OU1. You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)

 clip_image001[52]
You need to configure GPO1 to App1y to all of the users in OU1. What should you do?

A.    Modify the Security settings of GPO1.
B.    Disable Block Inheritance on OU1.
C.    Modify the GPO status of GPO1.
D.    Enforce GPO1.

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc739343(v=ws.10).aspx

QUESTION 315
Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2. Server1 is configured as an FTP server. Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and dynamically requests a data port. On Server1, you create a firewall rule to allow connections on TCP port 21. You need to configure Server1 to support the client connections from App1.exe. What should you do?

A.    Run netshadvfirewall set global statefulftp enable.
B.    Create an inbound firewall rule to allow App1.exe.
C.    Create a tunnel connection security rule.
D.    Run Set-NetFirewallRule -DisplayNameDynamicFTP -Profile Domain

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx#BKMK_set_2a
The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows
In the netsh advfirewall firewall context, the add command only has one variation, the add rule command.
Netsh advfirewall set global statefulftp:
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.
When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested.
Syntax
set global statefulftp { enable | disable | notconfigured }
Parameters
statefulftp can be set to one of the following values:
enable
The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.
disable
This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection.
notconfigured
Valid only when netsh is configuring a GPO by using the set store command.

QUESTION 316
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have configured a server, named L2P-SR07, as a VPN server. You are required to configure new firewall rules for workstation connections.
You want to achieve this using the least amount of administrative effort.
Which of the following actions should you take?

A.    You should consider making use of the Enable-NetFirewallRule cmdlet.
B.    You should consider making use of the New-NetFirewallRule cmdlet.
C.    You should consider making use of dism.exe from the command prompt.
D.    You should consider making use of dsadd.exe from the command prompt.

Answer: B
Explanation:
New-NetFirewallRule – Creates a new inbound or outbound firewall rule and adds the rule to the target computer.
You can’t Enable what doesn’t exist yet… you must use New-NetFirewallRule
 clip_image002[26]
http://technet.microsoft.com/en-us/library/jj554908%28v=wps.620%29.aspx http://blogs.technet.com/b/heyscriptingguy/archive/2012/11/13/use-powershell-to-create-new-windows- firewall-rules.aspx

QUESTION 317
Hotspot Question
Your company has a main office and a sales office. The main office has 2,000 users. The sales office has 20 users. All client computers in the sales office run Windows 8. The sales office contains a print server named App1 that runs Windows Server 2012 R2. App1 has a shared printer named Printer1. Printer1 connects to a network-attached print device. You plan to connect all of the users in the sales office to Printer1 on App1. You need to ensure that if App1 fails, the users can continue to print to Printer1. What should you configure on App1?To answer, select the appropriate option in the answer area.
 clip_image001[56]
Answer:
 clip_image002[28]

QUESTION 318
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and has the HyperV server role installed. On Server1, an administrator creates a virtual machine named VM1. A user named User1 is the member of the local Administrators group on Server1. User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.)
 clip_image001[58]
You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm cmdlet. What should you instruct User1 to do?

A.    Import the Hyper-V module.
B.    Install the Integration Services on VM1.
C.    Run Windows PowerShell with elevated privileges.
D.    Modify the membership of the local Hyper-V Administrators group.

Answer: C
Explanation:
 clip_image002[30]

QUESTION 319
Drag and Drop Question
You have a Hyper-V host named Server1. A technician creates a virtual machine named VM1 on Server1 by using the New Virtual Machine Wizard. You start VM1 and you discover that there is no option to start by using PXE. You need to ensure that you can start VM1 by using PXE. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
 clip_image002[32]
Answer:
 clip_image002[34]

QUESTION 320
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role installed. You need to implement NIC teaming on Server1. Which two network connections should you include on the NIC team? (To answer, select the two appropriate network connections in the answer area.)
 clip_image001[60]
Answer:
 clip_image002[36]

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(301-310)!

QUESTION 301
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Print1 that runs Windows Server 2012 R2. Print1 has 50 shared printers. Each printer is listed in Active Directory. From Active Directory Users and Computers, you browse to Print1 and you discover that the 50 printers are not visible. You need to ensure that you can view the printer objects in Active Directory Users and Computers. Which option should you select?To answer, select the appropriate option in the answer area.
 clip_image001[18]
Answer:
 clip_image001[20]

QUESTION 302
You have a file server named File1 that runs Windows Server 2012 R2. File1 contains a shared folder named Share1. Share1 contains an Application named SalesApp1.exe. The NTFS permissions for Share1 are shown in the following table.
 clip_image001[22]
The members of L_Sales discover that they cannot add files to Share1. Domain users can run SalesApp1.exe successfully. You need to ensure that the members of L_Sales can add files to Share1.
What should you do?

A.    Add the Domain Users group to L_Sales.
B.    Add L_Sales to the Domain Users group.
C.    Edit the Share permissions.
D.    Edit the NTFS permissions.

Answer: C
Explanation:
http://www.techrepublic.com/article/windows-101-know-the-basics-about-ntfs-permissions/
The least restrictive permission applies here, so the users from L_sales have read & execute, write… in order to add files they need the NTFS permission called MODIFY.
Based on NTFS permissions:
Modify: Users can view and modify files and file properties, including deleting and adding files to a directory or file properties to a file.

QUESTION 303
Hotspot Question
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1.
 clip_image001[24]
A user named User1 is a member of Group1 and Group2. A user named User2 is a member of Group2 and Group3. You need to identify which actions the users can perform when they access the files in Share1. What should you identify? To answer, select the appropriate actions for each user in the answer area.

 clip_image001[26]
Answer:
 clip_image001[28]

QUESTION 304
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed. On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1. When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear. You need to view the Deployed Printers node in GPO1. What should you do?

A.    On Server1, modify the Group Policy filtering options of GPO1.
B.    On a domain controller, create a Group Policy central store.
C.    On Server2, install the Group Policy Management feature.
D.    On Server1, configure the security filtering of GPO1.

Answer: C
Explanation:
Pre-Requisites
To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles to configure the various settings. Its assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers.
The wording does not say if GPMC is installed on server 2, so I can only think that it does not deploy the GPO because it had no GPMC on server 2..
GPMC is not installed by default:
http://pipe2text.com/?page_id=1591
http://technet.microsoft.com/en-us/library/cc725932.aspx

QUESTION 305
Your network contains an Active Directory domain named contoso.com. All of the App1ocker policy settings for the member servers are configured in a Group Policy object (GPO) named GPO1. A member server named Server1 runs Windows Server 2012 R2. On Server1, you test a new set of App1ocker policy settings by using a local computer policy. You need to merge the local App1ocker policy settings from Server1 into the App1ocker policy settings of GPO1. What should you do?

A.    From Local Group Policy Editor on Server1, exportan .xml file. Import the .xml file by using Group
Policy Management Editor.
B.    From Local Group Policy Editor on Server1, exportan .inf file. Import the .inf file by using Group Policy
Management Editor.
C.    From Server1, run the Set-App1ockerPolicy cmdlet.
D.    From Server1, run the New-App1ockerPolicy cmdlet.

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/ee791816(v=ws.10).aspx
The Set-AppLockerPolicy cmdlet sets the specified Group Policy Object (GPO) to contain the specified AppLocker policy. If no Lightweight Directory Access Protocol (LDAP) is specified, the local GPO is the default. When the Merge parameter is used, rules in the specified AppLocker policy will be merged with the AppLocker rules in the target GPO specified in the LDAP path. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved. If the Merge parameter is not specified, then the new policy will overwrite the existing policy.

QUESTION 306
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GP1 that is linked to the domain. GP1 contains a software restriction policy that blocks an Application named App1. You have a workgroup computer named Computer1 that runs Windows 8. A local Group Policy on Computer1 contains an Application control policy that allows App1. You join Computer1 to the domain. You need to prevent App1 from running on Computer1.
What should you do?

A.    From Group Policy Management, add an Application control policy to GP1.
B.    From Group Policy Management, enable the Enforced option on GP1.
C.    In the local Group Policy of Computer1, configure a software restriction policy.
D.    From Computer1, run gpupdate /force.

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc785665(v=ws.10).aspx
Order of processing settings
This section provides details about the order in which Group Policy settings for users and computers are processed.
Group Policy settings are processed in the following order:
1.Local Group Policy object—Each computer has exactly one Group Policy object that is stored locally. This processes for both computer and user Group Policy processing.
2.Site—Any GPOs that have been linked to the site that the computer belongs to are processed next.
3.Domain—Processing of multiple domain-linked GPOs is in the order specified by the administrator, on the Linked Group Policy Objects tab for the domain in GPMC.
4.Organizational units—GPOs that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on. Finally, the GPOs that are linked to the organizational unit that contains the user or computer are processed.
This order means that the local GPO is processed first, and GPOs that are linked to the organizational unit of which the computer or user is a direct member are processed last, **which overwrites settings in the earlier GPOs if there are conflicts.** (If there are no conflicts, then the earlier and later settings are merely aggregated.)

QUESTION 307
Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2. Server1 is configured as an FTP server. Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and dynamically requests a data port. On Server1, you create a firewall rule to allow connections on TCP port 21. You need to configure Server1 to support the client connections from App1.exe. What should you do?

A.    Run netsh firewall addportopening TCP 21 dynamicftp.
B.    Create a tunnel connection security rule.
C.    Create an outbound firewall rule to allow App1.exe.
D.    Run netshadvfirewall set global statefulftp enable.

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx#BKMK_set_2a
The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows
In the netsh advfirewall firewall context, the add command only has one variation, the add rule command.
Netsh advfirewall set global statefulftp:
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.
When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested.
Syntax
set global statefulftp { enable | disable | notconfigured }
Parameters
statefulftp can be set to one of the following values:
enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.
disable
This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection.
notconfigured
Valid only when netsh is configuring a GPO by using the set store command.

QUESTION 308
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1 as shown in the OU1 exhibit. (Click the Exhibit button.)
 clip_image001[30]
The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.)
 clip_image001[32]
You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1 exhibit. (Click the Exhibit button.)

 clip_image001[34]
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
 clip_image001[36]
Answer:
 clip_image001[38]

QUESTION 309
Your company has a main office and four branch offices. The main office contains a server named Server1 that runs Windows Server 2012 R2. The IP configuration of each office is configured as shown in the following table.
 clip_image001[40]
You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run?

A.    route.exe add -p 192.168.0.0 mask 255.255.248.0 172.31.255.254
B.    route.exe add -p 192.168.12.0 mask 255.255.252.0 172.31.255.254
C.    route.exe add -p 192.168.8.0 mask 255.255.252.0 172.31.255.254
D.    route.exe add -p 192.168.12.0 mask 255.255.255.0 172.31.255.254

Answer: B

QUESTION 310
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named L2PServ, which host the computer accounts for servers in the L2P.com domain.
You have been tasked with adding a group to a local group on all servers in the L2P.com domain. This group should not, however, be removed from the local group.
Which of the following actions should you take?

A.    You should consider adding a restricted group.
B.    You should consider adding a global group.
C.    You should consider adding a user group.
D.    You should consider adding a server group.

Answer: A
Explanation:
Restricted groups in Group policies are a simple way of delegating permissions or group membership centrally to any domain computer or server. Using restricted groups it is easier to enforce the lowest possible permissions to any given account.
Computer Configuration\Windows Settings\Security Settings\Restricted Groups
Restricted groups allow an administrator to define two properties for security-sensitive groups (that is, "restricted" groups). The two properties are Members and Member Of .
The Members list defines who should and should not belong to the restricted group.
The Member Of list specifies which other groups the restricted group should belong to. When a restricted Group Policy is enforced, any current member of a restricted group that is not on the Members list is removed. Any user on the Members list which is not currently a member of the restricted group is added. The Restricted Groups folder is available only in Group Policy objects associated with domains, OUs, and sites. The Restricted Groups folder does not appear in the Local Computer Policy object. If a Restricted Group is defined such that it has no members (that is, the Members list is empty), then all members of the group are removed when the policy is enforced on the system. If the Member Of list is empty no changes are made to any groups that the restricted group belongs to. In short, an empty Members list means the restricted group should have no members while an empty Member Of list means "don’t care" what groups the restricted group belongs to.
 clip_image002[22]
http://technet.microsoft.com/en-us/library/cc957640.aspx

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(291-300)!

QUESTION 291
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The domain contains a user named User1 and a global security group named Group1. You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1. Which cmdlet should you run?

A.    Add-AdPrincipalGroupMembership
B.    Install- AddsDomainController
C.    Install- WindowsFeature
D.    Install-AddsDomain
E.    Rename-AdObject
F.    Set-AdAccountControl
G.    Set-AdGroup
H.    Set-User

Answer: G
Explanation:
http://technet.microsoft.com/en-us/library/ee617199.aspx
The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters.

QUESTION 292
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The domain contains a user named User1 and a global security group named Group1. You need to prevent User1 from changing his password. The solution must minimize administrative effort. Which cmdlet should you run?

A.    Add-AdPrincipalGroupMembership
B.    Install- AddsDomainController
C.    Install- WindowsFeature
D.    Install-AddsDomain
E.    Rename-AdObject
F.    Set-AdAccountControl
G.    Set-AdGroup
H.    Set-User

Answer: F
Explanation:
http://technet.microsoft.com/en-us/library/ee617249.aspx
Set-ADAccountControl
The Set-ADAccountControl cmdlet modifies the user account control (UAC) values for an Active Directory user or computer account. UAC values are represented by cmdlet parameters.
CannotChangePassword
Modifies the ability of an account to change its password. To disallow password change by the account set this to $true.. This parameter changes the Boolean value of the CannotChangePassword property of an account.
The following example shows how to specify the PasswordCannotChange parameter.
-CannotChangePassword $false

QUESTION 293
You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre Channel adapter. Host1 contains two virtual machines named VM1 and VM2. You need to provide VM1 with direct access to the SAN. VM2 must not require access to the SAN. Which two configurations should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    On VM1, configure a Fibre Channel adapter.
B.    On Host1, configure a new virtual switch.
C.    On VM1, add a network adapter.
D.    On Host1, configure a new Virtual Fibre Channel SAN.
E.    On Host1, modify the Hyper-V settings.

Answer: AD
Explanation:
Step 1:
D: Building a Virtual SAN
The process of setting up virtual Fibre Channel starts with building a virtual SAN. The easiest way to accomplish this is to open the Hyper-V Manager, right click on the listing for your Hyper-V server in the console tree, and then choose the Virtual SAN Manager command from the shortcut menu.
Step 2:
A: Once you have created a virtual SAN, the next step in the process is to link a virtual machine to the virtual SAN. To do so, right click on the virtual machine for which you want to provide Fibre Channel connectivity and select the Settings command from the resulting shortcut menu. Next, select the Add Hardware container, as shown in the figure above, and then select the Fibre Channel Adapter option from the list of available hardware. Etc.
Note:
* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides VM guest operating systemswith direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated with a virtual machine

QUESTION 294
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role installed. Server1 has 8 GB of RAM. Server1 hosts five virtual machines that run Windows Server 2012 R2. The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.)

 clip_image002[10]
You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. Which settings should you modify?

A.    BIOS
B.    Automatic Start Action
C.    Automatic Stop Action
D.    Integration Services

Answer: C
Explanation:
http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/
 clip_image002[12]

QUESTION 295
You have a laptop named Computer1. Computer1 runs Windows 8 Enterprise. Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1. For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system. You install the drivers for the wireless network adapter. You need to ensure that you can connect to Network1 from Windows Server 2012 R2. What should you do?

A.    From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings.
B.    From a local Group Policy object (GPO), configure the settings of Windows Connection Manager.
C.    From Server Manager, install the Wireless LAN Service feature.
D.    Restart the WLAN AutoConfig service.

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh994698.aspx
The Wireless LAN service is a feature in Windows Server® 2012 R2 that you can use to enable the wireless WLAN AutoConfig service, and to configure the WLAN AutoConfig service for automatic startup. Once enabled, the WLAN AutoConfig service dynamically selects which wireless network the computer automatically connects to, and configures the necessary settings on the wireless network adapter. This includes automatically selecting and connecting to a more preferred wireless network when one becomes available.
To enable the Wireless LAN Service
In Server Manager Dashboard, click Manage, and then click Add Roles and Features. The Add Roles and Features Wizard opens.
Click Next. In Select installation type, select Role-based or feature-based installation, and then click Next.
In Select destination server, enable Select a server from the server pool, and in Server Pool, select the server for which you want to enable the Wireless LAN Service, and then click Next.
In Select server roles, click Next.
In Select Server features, in Features, select Wireless LAN Service, and then click Next.

QUESTION 296
Your network contains an Active Directory domain named contoso.com. You install Windows Server 2012 on a new server named Server1 and you join Server1 to the domain. You need to ensure that you can view processor usage and memory usage information in Server Manager. What should you do?

A.    From Server Manager, click Configure Performance Alerts.
B.    From Server Manager, click Start Performance Counters.
C.    From Performance Monitor, start the System Performance Data Collector Set (DCS).
D.    From Performance Monitor, create a Data Collector Set (DCS).

Answer: B
Explanation:
 clip_image002[14]

QUESTION 297
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The domain contains a user named User1 and a global security group named Group1. You need to modify the SAM account name of Group1. Which cmdlet should you run?

A.    Add-AdPrincipalGroupMembership
B.    Install AddsDomainControNer
C.    Install WindowsFeature
D.    Install AddsDomain
E.    Rename-AdObject
F.    Set-AdAccountControl
G.    Set-AdGroup
H.    Set-User

Answer: E

QUESTION 298
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots. You need to modify the snapshot file location of VM1. What should you do?

A.    Right-click VM1, and then click Export…
B.    Shut down VM1, and then modify the settings of VM1.
C.    Delete the existing snapshots, and then modify the settings of VM1.
D.    Pause VM1, and then modify the settings of VM1.

Answer: C
Explanation:
http://doquent.wordpress.com/2012/09/02/relocating-a-hyper-v-vm-folder/
 clip_image001[10]
It is not A, watch this: http://www.youtube.com/watch?v=YvwtpPQk0Cs

QUESTION 299
Hotspot Question
The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button.)
 clip_image001[12]
The settings for Diskl.vhdx are configured as shown in the Diskl.vhdx exhibit. (Click the Exhibit button.)
 clip_image001[14]
The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click the Exhibit button.)

 clip_image002[16]
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
 clip_image002[18]
Answer:
 clip_image002[20]

QUESTION 300
You have a server named Server1 that runs Windows Server 2012 R2. A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)

 clip_image001[16]
You need to ensure that you can enable NTFS disk quotas for volume D. What should you do first?

A.    Install the File Server Resource Manager role service.
B.    Format volume D.
C.    Run the convert.exe command.
D.    Convert the disk to a dynamic disk.

Answer: B
Explanation:
http://blogs.technet.com/b/askpfeplat/archive/2013/01/02/windows-server-2012-does-refs-replace-ntfs-when-should-i-use-it.aspx
REFS to NTFS requires format not convert.exe

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html