P.S. Accurate 70-410 free samples are available on Google Drive, GET MORE: https://drive.google.com/open?id=1XEw2m0USoR1DzdkDOR873WF9RHZitH-o
New Questions 6
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports.
On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP.
Users report that they can no longer connect to Server1 by using App1. You need to ensure that App1 can connect to Server1.
What should you run on Server1?
A. Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow
B. netsh advfirewall firewall set rule name=allowdynamic new action = allow
C. Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
D. netsh advfirewall firewall add rule name=allowdynamic action=allow
Answer: : C
New Questions 7
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.
You attach four 500-GB disks to Server1.
You need to configure the storage to meet the following requirements:
u2711 Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years.
u2711 Storage for an application named Application2 must be provided. Application2
requires 20 GB and will require a maximum of 900 GB in three years.
u2711 The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications.
u2711 The storage must be available if a single disk fails.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From File and Storage Services, create virtual disks by using fixed provisioning.
B. From File and Storage Services, create virtual disks by using thin provisioning.
C. From File and Storage Services, create a storage pool that uses all four disks.
D. From Disk Management, create a new RAID-5 volume that uses all four disks.
E. From Disk Management, create two new mirror volumes that use two disks each.
Answer: A,C
Explanation: Reference: http://technet.microsoft.com/en-us/library/jj822937.aspx
New Questions 8
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.
You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot?
A. Run the Stop-VM cmdlet.
B. Run the Convert-VHD cmdlet.
C. Decrease the Maximum RAM
D. Decrease the Minimum RAM.
Answer: A
Explanation:
What are virtual machine snapshots?
Virtual machine snapshots capture the state, data, and hardware configuration of a running
virtual machine.
What are snapshots used for?
Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual machine snapshots are intended mainly for use in development and test environments. Having an easy way to revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can troubleshoot a problem. There are certain circumstances in which it may make sense to use snapshots in a production environment.
For example, you can use snapshots to provide a way to revert a potentially risky operation in a production environment, such as applying an update to the software running in the virtual machine.
How are snapshots stored?
Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper- V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify.
http://technet.microsoft.com/pt-pt/library/dd560637%28v=ws.10%29.aspx
Reducing the available RAM for the VM would reduce the size of the snapshot, what better than have the machine turn off, not using any memory.
New Questions 9
Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers.
The domain controllers are configured as shown in the following table.
DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3. What should you do?
A. Open the %windir%\system32\config\netlogon.dns file.
B. Run dcdiag /test:dns
C. Open the %windir%\system32\dns\backup\adatum.com.dns file.
D. Run ipconfig /displaydns.
Answer: A
Explanation:
:A. Netlogon service creates a log file that contains all the locator resource records and places the logfile in the following location:
:B. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help introubleshooting.
:C. dns backup file
:D. used to display current resolver cache content You can verify SRV locator resource records by viewing netlogon.dns, located in the %systemroot%\System32\Config folder. The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that host specific services.
SRV resource records are used to locate domain controllers for Active Directory. You can use Notepad, to view this file.
The first record in the file is the domain controlleru2021s Lightweight Directory Access Protocol (LDAP) SRV record.
This record should appear similar to the following: _ldap._tcp.Domain_Name
New Questions 10
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2.
A one-way external trust exists between contoso.com and adatum.com.
Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com.
What should you do?
A. Modify the Managed By settings of Group1.
B. Modify the Allowed to Authenticate permissions in adatum.com.
C. Change the type of Group1 to distribution.
D. Modify the name of Group1.
Answer: : B
Explanation:
* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access.
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.
New Questions 11
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2.
You need to uninstall Active Directory from DC5 manually. Which tool should you use?
A. The dsamain.exe command
B. The ntdsutil.exe command
C. The Remove-ADComputer cmdlet
D. The Remove-WindowsFeature cmdlet
Answer: C
Explanation:
The Remove-ADComputer cmdlet removes an Active Directory computer. Example: Remove-ADComputer -Identity "FABRIKAM-SRV4"
Remove one particular computer.
References:
http://technet.microsoft.com/en-us/library/ee662310.aspx http://support.microsoft.com/kb/216498
http://technet.microsoft.com/en-us/library/ee617250.aspx
New Questions 12
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules.
Which of the following is the cmdlet being discussed?
A. Set-NetFirewallRule
B. Enable-NetFirewallRule
C. Set-NetIPsecRule
D. Enable-NetIPsecRule
Answer: B
Explanation:
Enable-NetFirewallRule u2013 Enables a previously disabled firewall rule.
New Questions 13
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre Channel SAN feature.
Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature? (Choose all that apply.)
A. It prevents virtual machines from connecting directly to Fibre Channel storage.
B. It allows for virtual machines to connect to Fibre Channel storage directly.
C. It includes support for virtual SANs, live migration, and multipath I/O.
D. It includes support for virtual SANs, and live migration, but not multipath I/O.
Answer: B,C
Explanation:
To gain the full benefits of server virtualization and cloud architectures, virtualized workloads need to connect easily and reliably to existing SANs. For many enterprise organizations, Hyper-V deployments were limited in scale and scope because they lacked the ability to directly connect VMs to Fibre Channel SAN storage from inside a VM. Hyper- V in Windows Server 2012 R2 now provides virtual Fibre Channel Host Bus Adapter (HBA) ports within the guest operating system that runs the virtual machine, connecting virtual machines directly to FibreChannel SAN Logical Unit Numbers (LUNs).
Virtual Fibre Channel for Hyper-V provides several important advantages for Hyper-V environments:
Simplifies storage connectivity for virtualized workloads to ultra-reliable, high-performance Fibre Channel SAN storage.
Enables new solutions that require shared storage, such as failover clustering, live migration, andmultipath I/O.
Leverages and protects existing investments in Fibre Channel storage? Enables advanced FC SAN storage functionality for VMs.
Facilitates migration of FC workloads into the cloud.
Enables improved monitoring and troubleshooting, with visibility from the VM to the FC SAN storage.
Enables centralized management of Ethernet and FC-based virtualized workloads. Combining Virtual Fibre Channel for Hyper-V and the Brocade Fibre Channel SAN infrastructure greatly simplifies connectivity between Fibre Channel SAN storage and virtualized applications, enabling enterprise IT and hosting providers to achieve new levels of availability, reliability, and scalability for cloud-based services.
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows Server 2012 R2 provides Fibre Channel ports within the guest operating
system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.
New Questions 14
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.
Which of the following describes the results of running this cmdlet?
A. It removes one or more network adapters from a specified NIC team.
B. It removes a team interface from a NIC team.
C. It removes a specified NIC team from the host.
D. It removes a network adapter member from a switch team.
Answer: C
Explanation:
Remove-NetLbfoTeam removes the specified NIC team from the host.
The Remove-NetLbfoTeam cmdlet removes the specified NIC team from the host. This cmdlet disconnects all associated team members and providers from the team. You can specify the team to remove by using either a team object retrieved by Get-NetLbfoTeam, or by specifying a team name.
You can use Remove-NetLbfoTeam to remove all NIC teams from the server. You need administrator privileges to use Remove-NetLbfoTeam.
New Questions 15
Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. Server3 is configured to obtain an IP address automatically.
You need to ensure that Server3 only receives an IP address from Server1. The IP address must always be the same.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create an exclusion on Server1.
B. Create a filter on Server1.
C. Create a reservation on Server2
D. Create a reservation on Server1
E. Create a filter on Server2.
Answer: D,E
100% Improved Microsoft 70-410 Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/70-410/ (New 505 Q&As)