Tested of 70 410 exam questions free exam questions materials and resource for Microsoft certification for consumer, Real Success Guaranteed with Updated braindumps 70 410 pdf dumps vce Materials. 100% PASS Installing and Configuring Windows Server 2012 exam Today!

Q21. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to create a storage pool that will contain a new volume. 

You need to create a new 600-GB volume by using thin provisioning. The new volume must use the parity layout. 

What is the minimum number of 256-GB disks required for the storage pool? 

A. 2 

B. 3 

C. 4 

D. 5 

Answer:

Explanation: 

It takes 3 discs (minimum) in order to create a storage pool array with parity. If this array were using fixed provisioning, this would not be enough given the 256MB capacity (since only 2/3rds of 256 X 3 - less than 600 - could be used as actual data with the rest being parity bits), but since this array uses thin provisioning, a 600GB volume could technically be set up on a 20GB disc and it would still show as 600GB. (So, essentially, the question really becomes how many drives it takes in a storage pool to create a parity array.) 

References: 

http://technet.microsoft.com/en-us/library/hh831391.aspx http://www.ibeast.com/content/tools/RaidCalc/RaidCalc.asp 

http://www.raid-calculator.com/default.aspx https://www.icc-usa.com/raid-calculator 


Q22. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2.You join Core1 to the adatum.com domain. 

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. 

What should you do on Core1? 

A. Run the Enable-NetFirewallRule cmdlet. 

B. Run the Disable-NetFirewallRule cmdlet. 

C. Install Windows Management Framework. 

D. Install Remote Server Administration Tools (RSAT). 

Answer:

Explanation: 

Event Viewer is a DCOM service which you can enable by either using sconfig to configure remote management or, if you only wish to change the firewall rule for DCOM, enabling the DCOM inbound firewall rule via PowerShell or Windows Firewall with Advanced Security. 


Q23. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

The password policy for the domain is set to require a minimum password length of 10 characters. 

A user named User1 and a user named User2 work for the sales department. 

User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. 

You need to identify what forces the two users to have different password lengths. 

Which tool should you use? 

A. Credential Manager 

B. Security Configuration Wizard (SCW) 

C. Group Policy Management 

D. Active Directory Administrative Center 

Answer:

Explanation: 

In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. 

This is found in the Active Directory Administrative Center. You can use Active Directory Administrative Center to perform the following Active Directory administrative tasks: Create new user accounts or manage existing user accounts Create new groups or manage existing groups Create new computer accounts or manage existing computer accounts Create new organizational units (OUs) and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers Filter Active Directory data by using query-building search 

: http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx 


Q24. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

An organizational unit (OU) named OU1 contains the computer accounts for laptops and 

desktop computers. 

A Group Policy object (GPO) named GP1 is linked to OU1. 

You need to ensure that the configuration settings in GP1 are applied only to a user named 

User1. 

What should you do? 

A. Modify the security settings of OU1. 

B. Modify the GPO Status of GP1. 

C. Modify the security settings of GP1. 

D. Configure the WMI Filter of GP1. 

Answer:

Explanation: 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p. 470, 482 http://technet.microsoft.com/en-us/library/jj134176 WMI filtering using GPMC 


Q25. - (Topic 3) 

Your network contains two subnets. The subnets are configured as shown in the following table. 

You have a server named Server2 that runs Windows Server 2012 R2. Server2 is connected to LAN1. You run the route print command as shown in the exhibit. 

You need to ensure that Server2 can communicate with the client computers on LAN2. 

What should you do? 

A. Change the metric of the 10.10.1.0 route. 

B. Set the state of the Teredo interface to disable. 

C. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. 

D. Run route delete 172.23.2.0. 

Answer:

Explanation: 

You should delete the route 172.23.2.0 to allow communication between the client computers and Server2. The route is used to identify PIv6 /IPv4 packets that are being sent. 


Q26. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

You need to identify whether the Company attribute replicates to the global catalog. 

Which part of the Active Directory partition should you view? 

To answer, select the appropriate Active Directory object in the answer area. 

Answer: 


Q27. - (Topic 1) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

VM1 has several snapshots. 

You need to modify the snapshot file location of VM1. 

What should you do? 

A. Right-click VM1, and then click Export. 

B. Shut down VM1, and then modify the settings of VM1. 

C. Delete the existing snapshots, and then modify the settings of VM1. 

D. Pause VM1, and then modify the settings of VM1. 

Answer:


Q28. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012 R2. 

CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1. 

When you attempt to remove Printer1 from CONT2, you receive the error message shown in the exhibit. (Click the Exhibit button.) 

You successfully delete the other printers installed on CONT2. 

You need to identify what prevents you from deleting Printer1 on CONT2. 

What should you identify? 

A. Printer1 is deployed as part of a mandatory profile. 

B. Printer1 is deployed by using a Group Policy object (GPO). 

C. Your user account is not a member of the Print Operators group on CONT2. 

D. Your user account is not a member of the Print Operators group on CONT1. 

Answer:


Q29. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot? 

A. Run the Stop-VM cmdlet. 

B. Run the Convert-VHD cmdlet. 

C. Decrease the Maximum RAM 

D. Decrease the Minimum RAM. 

Answer:

Explanation: 

What are virtual machine snapshots? 

Virtual machine snapshots capture the state, data, and hardware configuration of a running 

virtual machine. 

What are snapshots used for? 

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. 

For this reason, virtual machine snapshots are intended mainly for use in development and 

test environments. Having an easy way to revert a virtual machine can be very useful if you 

need to recreate a specific state or condition so that you can troubleshoot a problem. 

There are certain circumstances in which it may make sense to use snapshots in a 

production environment. 

For example, you can use snapshots to provide a way to revert a potentially risky operation 

in a production environment, such as applying an update to the software running in the 

virtual machine. 

How are snapshots stored? 

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly 

consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V 

in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located 

in the same folder as the virtual machine by default. In Hyper- V in Windows Server 2008 

R2, the files usually are located in the same folder as the virtual hard disk. The following 

exceptions affect the location of the snapshot data files: If the virtual machine was imported 

with snapshots, they are stored in their own folder. If the virtual machine has no snapshots 

and you configure the virtual machine snapshot setting, all snapshots you take afterwards 

will be stored in the folder you specify. 

http://technet.microsoft.com/pt-pt/library/dd560637%28v=ws.10%29.aspx 

Reducing the available RAM for the VM would reduce the size of the snapshot, what better 

than have the machine turn off, not using any memory. 


Q30. - (Topic 1) 

You have a server named Server1. Server1 runs Windows Server 2012 R2. 

Server1 has a thin provisioned disk named Disk1. 

You need to expand Disk1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From File and Storage Services, extend Disk1. 

B. From File and Storage Services, add a physical disk to the storage pool. 

C. From Disk Management, extend the volume. 

D. From Disk Management, delete the volume, create a new volume, and then format the volume. 

E. From File and Storage Services, detach Disk1. 

Answer: A,B 

Explanation: 

Step 1 (B): if required add physical disk capacity. 

Step 2 (A): Dynamically extend the virtual disk (not volume). 

The File and Storage Services role and the Storage Services role service are installed by 

default, but without any additional role services. This basic functionality enables you to use 

Server Manager or Windows PowerShell to manage the storage functionality of your 

servers. 

Windows Server 2012 Storage Space subsystem now virtualizes storage by abstracting 

multiple physical disks into a logical construct with specified capacity. 

The process is to group selected physical disks into a container, the so-called storage pool, 

such that the total capacity collectively presented by those associated physical disks can 

appear and become manageable as a single and seemingly continuous space. 

Subsequently storage administrator creates a virtual disk based on a storage pool, 

configure a storage layout which is essentially a RAID level, and expose the storage of the 

virtual disk as a drive letter or a mapped folder in Windows Explorer. 

The system administrator uses File and Storage Services in Server Manager or the Disk 

Management tool tore scan the disk, bring the disk online, and extend the disk size.