[Free] 2018(May) EnsurePass Testinsides Microsoft 70-410 Dumps with VCE and PDF 261-270

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!

Installing and Configuring Windows Server 2012

Question No: 261 – (Topic 3)

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1.

What should you do first?

  1. Copy the snapshot file

  2. Pause VM1

  3. Shut down VM1

  4. Delete the snapshot

Answer: D Explanation:

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify.

Caution

Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable.

http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx

Question No: 262 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

You need to configure storage for a virtual machine to meet the following requirements:

->Support up to 3 TB of data on a single hard disk.

->Allocate disk space as needed.

->Use a portable storage format.

What should you configure?

  1. A fixed-size VHDX

  2. A pass-through disk

  3. A fixed-size VHD

  4. A dynamically expanding VHDX

  5. A dynamically expanding VHD

Answer: D Explanation:

Support for virtual hard disk storage capacity of up to 64 TB. vhd max is 2TB

Dynamically expanding virtual hard disk uses only as much physical storage space as it needs to store the actual data that the disk currently contains. The size of the virtual disk’s image file then grows as additional data is written to it.

References:

http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 157-158

70-410: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7: Hyper-V virtualization, Lesson 2: Deploying and Configuring virtual machines, p. 320

Question No: 263 DRAG DROP – (Topic 3)

Your company has a main office that contains 225 client computers. The client computers are located on a subnet that uses the network ID of 10.10.1.0/24.

The company plans to open two branch offices. The offices will be configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to select a network prefix for each office to ensure that there are enough IPv4 addresses for each client computer.

The solution must minimize the number of unused IP addresses. Which network prefixes should you select?

To answer, drag the appropriate network prefix to the correct branch office in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Question No: 264 DRAG DROP – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that has the DNS Server server role installed. DC1 hosts an Active Directory-integrated zone for the domain. The domain contains a member server named Server1.

You install the DNS Server server role on Server1.

You need to ensure that Server1 can respond authoritatively to queries for the existing contoso.com namespace.

Which cmdlets should you run on each server? (To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

The Set-DnsServerPrimaryZonecmdlet changes settings for an existing Domain Name System (DNS) primary zone. You can change values that are relevant for either Active Directory-integrated zones or file-backed zones. This cmdlet should be run on Server1 to make it authoritative. The Add-DnsServerSecondaryZonecmdlet adds a specified secondary zone on a Domain Name System (DNS) server. You can create either a forward lookup zone or a reverse lookup zone. This cmdlet should be run on DC1.

Question No: 265 HOTSPOT – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets.

You add three new printers to the MainOffice subnet. The printers have static IP addresses. The IP addresses are consecutive.

You need to create an exclusion range that contains the IP addresses of the printers.

From which node should you configure the exclusion range? To answer, select the appropriate node in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Question No: 266 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2.

An administrator creates a security template named Template1. You need to apply Template1 to Server1.

Which snap-in should you use?

  1. Resultant Set of Policy

  2. Security Configuration and Analysis

  3. Authorization Manager

  4. Security Templates

Answer: B Explanation:

The Security Configuration and Analysis tool contains the Local Security Policy snap-in that is used to apply templates.

References:

http://technet.microsoft.com/en-us/library/bb742512.aspx http://technet.microsoft.com/en-us/library/cc739442(v=WS.10).aspx

Question No: 267 – (Topic 3)

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5.

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.

Which domain controller should you identify?

  1. DC1

  2. DC2

  3. DC3

  4. DC4

Answer: C

Question No: 268 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.

On Server1, you create a share named Documents.

You need to ensure that users can recover files that they accidently delete from Documents.

What should you do?

  1. Enable shadow copies by using Computer Management.

  2. Create a storage pool that contains a two-way mirrored volume by using Server Manager.

  3. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.

  4. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).

    Answer: A Explanation:

    If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis-that is, you cannot select specific shared folders and files on a volume to be copied or not copied.

    To enable and configure Shadow Copies of Shared Folders:

    1. Click Start, point to Administrative Tools, and then click Computer Management.

    2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies.

    3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable.

    4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings.

    5. To make changes to the default schedule and storage area, click Settings.

      Shadow copies – a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten.

      References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302

      Question No: 269 – (Topic 3)

      You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the Hyper-V server role installed.

      The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.)

      Ensurepass 2018 PDF and VCE

      You create a virtual machine on Server2 named VM1.

      You need to ensure that you can configure a pass-through disk for VM1. What should you do?

      1. Convert Disk 1 to a basic disk.

      2. Take Disk 1 offline.

      3. Create a partition on Disk 1.

      4. Convert Disk 1 to a MBR disk.

Answer: B Explanation:

Pass-through Disk Configuration

Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective

Question No: 270 DRAG DROP – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.

On Server1, you create a share named Documents. The Share permission for the Documents share is configured as shown in the following table.

Ensurepass 2018 PDF and VCE

The NTFS permission for the Documents share is configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to configure the Share and NTFS permissions for the Documents share. The permissions must meet the following requirements:

->Ensure that the members of a group named Group1 can read files and run programs in Documents.

->Ensure that the members of Group1 can modify the permissions on only their own

files in Documents.

->Ensure that the members of Group1 can create folders and files in Documents.

->Minimize the number of permissions assigned to users and groups.

How should you configure the permissions?

To answer, drag the appropriate permission to the correct location. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

Granting a user Full Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is restricted in some other way. Be cautious in granting Full Control.

If you want to manage folder access by using NTFS permissions exclusively, set share permissions to Full Control for the Everyone group.

NTFS permissions affect access both locally and remotely. NTFS permissions apply regardless of protocol. Share permissions, by contrast, apply only to network shares. Share permissions do not restrict access to any local user, or to any terminal server user, of the computer on which you have set share permissions. Thus, share permissions do not provide privacy between users on a computer used by several users, nor on a terminal server accessed by several users.

100% Ensurepass Free Download!
Download Free Demo:70-410 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 70-410 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply