[Free] 2018(Aug) Ensurepass Microsoft 70-410 Dumps with VCE and PDF 21-30

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!

Installing and Configuring Windows Server 2012

Question No: 21 – (Topic 1)

You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre

Channel adapter.

Host1 contains two virtual machines named VM1 and VM2.

You need to provide VM1 with direct access to the SAN. VM2 must not require access to the SAN.

Which two configurations should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. On VM1, configure a Fibre Channel adapter.

  2. On Host1, configure a new virtual switch.

  3. On VM1, add a network adapter.

  4. On Host1, configure a new Virtual Fibre Channel SAN.

  5. On Host1, modify the Hyper-V settings.

Answer: A,D Explanation:

Step 1:

D. Building a Virtual SAN

The process of setting up virtual Fibre Channel starts with building a virtual SAN. The easiest way to accomplish this is to open the Hyper-V Manager, right click on the listing for your Hyper-V server in the console tree, and then choose the Virtual SAN Manager command from the shortcut menu.

Step 2:

A. Once you have created a virtual SAN, the next step in the process is to link a virtual machine to the virtual SAN. To do so, right click on the virtual machine for which you want to provide Fibre Channel connectivity and select the Settings command from the resulting shortcut menu. Next, select the Add Hardware container, as shown in the figure above, and then select the Fibre Channel Adapter option from the list of available hardware. Etc.

Note:

* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides VM guest operating systems with direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated with a virtual machine.

Question No: 22 HOTSPOT – (Topic 1)

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2.

You share several printers on Server1.

You need to ensure that you can view the printer objects associated to Server1 in Active Directory Users and Computers.

Which option should you select?

To answer, select the appropriate option in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

You can view printer objects in Active Directory by clicking Users, Groups, and Computers as containers from the View menu in the Active Directory Users and Computers snap-in. By default, printer objects are created under the machine object in which they are shared.

After you turn on the Users, Groups, and Computers as containers option, you can see printers by expanding the printer#39;s host computer.

Question No: 23 – (Topic 1)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

An iSCSI SAN is available on the network.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

You create a LUN on the SAN to host the virtual hard drive files for the virtual machines.

You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space.

Which type of virtual hard disk should you create on the LUN?

  1. Dynamically expanding VHDX

  2. Fixed-size VHDX

  3. Fixed-size VHD

  4. Dynamically expanding VHD

Answer: B Explanation:

The virtual disk needs to be a VHDX file since it is going to be over 2TB in size and it must be fixed-size so that the space is already taken on the server (that way the server does not run out of space as the volume grows) even if the actual virtual disk does not yet hold that amount of data.

Question No: 24 – (Topic 1)

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host.

You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Add the computer account of DC1 to the Cloneable Domain Controllers group.

  2. Create a DCCloneConfig.xml file on DC1.

  3. Add the computer account of DC3 to the Cloneable Domain Controllers group.

  4. Run the Enable-AdOptionalFeaturecmdlet.

  5. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.

Answer: A,B Explanation:

  1. Cloneable Domain Controllers Group There’s a new group in town. It’s called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group.

  2. DCCloneConfig.xml

There’s one key difference between a cloned DC and a DC that is being restored to a previous snapshot:

DCCloneConfig.XML.

DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways.

The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor

By editing an existing config file, again with an XML editor.

Reference: Virtual Domain Controller Cloning in Windows Server 2012.

Question No: 25 – (Topic 1)

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain.

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.

What should you do on Core1?

  1. Run the Disable NetFirewallRule cmdlet.

  2. Install Remote Server Administration Tools (RSAT).

  3. Install Windows Management Framework.

  4. Run the Enable-Com Network Access Firewall Rule.

Answer: D Explanation:

Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the NetFirewallRule command. This will allow you to view the event logs.

Question No: 26 – (Topic 1)

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts.

Servers are restarted only occasionally.

You need to identify which servers were restarted during the last two days. What should you do?

  1. Run dsquery computer and specify the -staiepwd parameter.

  2. Run Get-ADComputer and specify the SearchScope parameter.

  3. Run Get-ADComputer and specify the IastLogon property.

  4. Run dsquery server and specify the -o parameter

Answer: C

Question No: 27 – (Topic 1)

Your network contains an Active Directory domain named contoso.com.

You create a software restriction policy to allow an application named App1 by using a certificate rule.

You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list (CRL).

What should you do?

  1. Modify the rule for App1.

  2. Modify the Trusted Publishers Properties.

  3. Create a new certificate rule for App1.

  4. Modify the Enforcement Properties.

Answer: B

Question No: 28 – (Topic 1)

Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2.

Server1 is configured as an FTP server.

Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and dynamically requests a data port.

On Server1, you create a firewall rule to allow connections on TCP port 21.

You need to configure Server1 to support the client connections from App1.exe. What should you do?

  1. Run netsh advfirewall set global statefulftp enable.

  2. Create an inbound firewall rule to allow App1.exe.

  3. Create a tunnel connection security rule.

  4. Run Set-NetFirewallRule -DisplayName DynamicFTP -Profile Domain

Answer: A Explanation:

The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows.

In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp:

Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.

When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested.

Syntax

set global statefulftp { enable | disable | notconfigured }

Parameters

statefulftp can be set to one of the following values: enable

The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.

disable

This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection.

notconfigured

Valid only when netsh is configuring a GPO by using the set store command.

Question No: 29 – (Topic 1)

You have a server named Server1 that runs Windows Server 2012 R2.

You plan to use Windows PowerShell Desired State Configuration (DSC) to confirm that the Application Identity service is running on all file servers.

You define the following configuration in the Windows PowerShell Integrated Scripting Environment (ISE):

Ensurepass 2018 PDF and VCE

You need to use DSC to configure Server1 as defined in the configuration. What should you run first?

  1. Service1

  2. Configuration1

  3. Start DscConfiguration

  4. Test-DscConfigu ration

Answer: B

Question No: 30 – (Topic 1)

In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. The test environment does not have Active Directory Domain Services (AD DS) installed.

You install the Active Directory Domain Services server role on Server1.

You need to configure Server1 as a domain controller. Which cmdlet should you run?

  1. Install-ADDSDomainController

  2. Install-ADDSDomain

  3. Install-ADDSForest

  4. Install-WindowsFeature

Answer: C Explanation:

Install-ADDSDomainController – Installs a domain controller in Active Directory. Install-ADDSDomain – Installs a new Active Directory domain configuration.

Install-ADDSForest – Installs a new Active Directory forest configuration.

Install-WindowsFeature – Installs one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features.

C:\PSgt;Install-ADDSForest -DomainName corp.contoso.com -CreateDNSDelegation DomainMode Win2008 – ForestMode Win 2008 R2 -DatabasePath “d:\NTDS” -SysvolPath “d:\SYSVOL” -LogPath “e:\Logs”Installs a new forest named corp.contoso.com, creates a DNS delegation in the contoso.com domain, sets domain functional level to Windows Server 2008 R2 and sets forest functional level to Windows Server 2008,installs the Active Directory database and SYSVOL on the D:\ drive, installs the log files on the E:\ drive and has the server automatically restart after AD DS installation is complete and prompts the user to provide and confirm the Directory Services Restore Mode (DSRM) password.

100% Ensurepass Free Download!
Download Free Demo:70-410 Demo PDF
100% Ensurepass Free Guaranteed!
70-410 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com