70-410 | What Free 70-410 practice test Is?


P.S. Accurate 70-410 item pool are available on Google Drive, GET MORE: https://drive.google.com/open?id=1l5e34W-NoOIZWc2w8rOUEhrHQBLmfQEX


New Microsoft 70-410 Exam Dumps Collection (Question 11 - Question 20)

New Questions 11

Your network contains multiple subnets.

On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.

You need to ensure that client computers can resolve IP addresses to host names. What should you do first?

A. Create a GlobalNames zone.

B. Convert the contoso.com zone to an Active Directory-integrated zone.

C. Configure dynamic updates for contoso.com.

D. Create a reverse lookup zone.

Answer: D

Explanation:

Use a reverse lookup zone to be able to resolve IP addresses to host names.

New Questions 12

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. Server3 is configured to obtain an IP address automatically.

You need to ensure that Server3 only receives an IP address from Server1. The IP address must always be the same.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create an exclusion on Server1.

B. Create a filter on Server1.

C. Create a reservation on Server2

D. Create a reservation on Server1

E. Create a filter on Server2.

Answer: D,E

New Questions 13

You have a file server named Server1 that runs Windows Server 2012 R2.

You need to ensure that a user named User1 can use Windows Server Backup to create a complete backup of Server1.

What should you configure?

A. The local groups by using Computer Management

B. The Role Assignment by using Authorization Manager

C. A task by using Authorization Manager

D. The User Rights Assignment by using the Local Group Policy Editor

Answer: A Explanation: References:

http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx http://msdn.microsoft.com/en-us/library/bb897401.aspx

New Questions 14

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.

You are running a training exercise for junior administrators. You are currently discussing the new VHD format called VHDX.

Which of the following is TRUE with regards to VHDX? (Choose all that apply.)

A. It supports virtual hard disk storage capacity of up to 64 GB.

B. It supports virtual hard disk storage capacity of up to 64 TB.

C. It does not provide protection against data corruption during power failures.

D. It has the ability to store custom metadata about the file that the user might want to record.

Answer: B,D

Explanation:

The main new features of the VHDX format are:

Support for virtual hard disk storage capacity of up to 64 TB.

Protection against data corruption during power failures by logging updates to the VHDX metadata structures.

Improved alignment of the virtual hard disk format to work well on large sector disks. The VHDX format also provides the following features:

Larger block sizes for dynamic and differencing disks, which allows these disks to attune to the needs of the workload.

A 4-KB logical sector virtual disk that allows for increased performance when used by applications and workloads that are designed for 4-KB sectors.

The ability to store custom metadata about the file that the user might want to record, such as operating system version or patches applied.

Efficiency in representing data (also known as u201ctrimu201d), which results in smaller file size and allows the underlying physical storage device to reclaim unused space. (Trim requires physical disks directly attached to a virtual machine or SCSI disks, and trim-compatible

hardware).

VHDX Format u2013 Features and Benefits VHDX format features provide features at the virtual hard disk as well as virtual hard disk file layers and is optimized to work well with modern storage hardware configurations and capabilities. At the virtual hard disk layer, benefits include the ability to represent a large virtual disk size up to 64 TB, support larger logical sector sizes for a virtual disk up to 4 KB that facilitates the conversion of 4 KB sector physical disks to virtual disks, and support large block sizes for a virtual disk up to 256 MB that enables tuning block size to match the IO patterns of the application or system for optimal performance. At the virtual hard disk file layer, the benefits include the use of a log to ensure resiliency of the VHDX file to corruptions from system power failure events and a mechanism that allows for small pieces of user generated data to be transported along with the VHDX file. On modern storage platforms, the benefits include optimal performance on host disks that have physical sector sizes larger than 512 bytes through improved data alignment and capability to use the information from the UNMAP command, sent by the application or system using the virtual hard disk, to optimize the size of the VHDX file. The format is designed so that additional features could be introduced in the future by Microsoft or extended by other parser implementations. The format provides parsers the ability to detect features in a VHDX file that a parser does not understand.

New Questions 15

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails.

What should you create?

A. a mirrored volume on Disk 1 and Disk 4

B. a mirrored volume on Disk 2 and Disk 3

C. a RAID-5 volume on Disk 1, Disk 2, and Disk 3

D. a spanned volume on Disk 0 and Disk 4

Answer: B

New Questions 16

You have two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. The servers are configured as shown in the following table.

The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.)

From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit. (Click the Exhibit button.)

You need to ensure that you can successfully ping Server2 from Server1. What should you do on Server1?

A. Disable Windows Firewall.

B. Modify the subnet mask.

C. Modify the DNS settings.

D. Modify the default gateway settings.

Answer: D

Explanation:

Route is used to view and modify the IP routing table.

Route Print displays a list of current routes that the host knows. Default gateways are important to make IP routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger inter network. In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing table to see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IP traffic for Host B to its own default gateway, IP Router 1.

The Default Gateway specifies the IP address of a router on the local subnet, which the system will use to access destinations on other networks. If the default gateway settings are not properly configured, then there can be no successful connection.

Reference:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269

New Questions 17

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed.

On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users.

You need to ensure that when the users connect to Documents, they only see the files to which they have access.

What should you do?

A. Enable access-based enumeration.

B. Configure Dynamic Access Control.

C. Modify the Share permissions.

D. Modify the NTFS permissions.

Answer: A

Explanation:

Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature allows users of Windows Server 2003-Based file servers to list only the files and folders to which they have access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access. Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they donu2021t have access to it.

Access-Based Enumeration (ABE) can be enabled at the Share properties through Server Manager

References:

Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features, Objective 2.1: Configure file and share access, p. 75- 80.

New Questions 18

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows:

u2711 IP address: 10.1.1.1

u2711 Subnet mask: 255.255.240.0

u2711 Default gateway: 10.1.1.254

What should you run?

A. Set-NetlPInterface

B. netcfg.exe

C. New-NetlPAddress

D. msconfig.exe

Answer: C

New Questions 19

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2.

You have a written security policy that states the following:

u2711 Only required ports must be open on the servers.

u2711 All of the servers must have Windows Firewall enabled.

u2711 Client computers used by administrators must be allowed to access all of the ports on all of the servers.

u2711 Client computers used by the administrators must be authenticated before the client computers can access the servers.

You have a client computer named Computer1 that runs Windows 8.

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. On Computer1, create a connection security rule.

B. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option.

C. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option.

D. On Computer1, create an inbound rule and select the Allow the connection if it is secure option.

E. On Computer1, create an outbound rule and select the Allow the connection if it is secure option.

F. On all of the servers, create a connection security rule.

Answer: A,C,F

Explanation:

Unlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy.

Traffic that matches a firewall rule that uses the Allow connection if it is secure setting bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. This method is supported on Windows Vista or Windows Server 2008.

References:

http://technet.microsoft.com/en-us/library/cc772021.aspx http://technet.microsoft.com/en-us/library/cc753463.aspx

New Questions 20

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5.

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.

Which domain controller should you identify?

A. DC1

B. DC2

C. DC3

D. DC4

Answer: C

100% Update Microsoft 70-410 Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/70-410/ (New 479 Q&As)