Download Installing and Configuring Windows Server 2012.70-410.Pass4Sure.2020-03-03.309q.vcex

Vendor: Microsoft
Exam Code: 70-410
Exam Name: Installing and Configuring Windows Server 2012
Date: Mar 03, 2020
File Size: 10 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contain several virtual machines that run Windows Server 2012 R2. 
You install the Network Load Balancing feature on the virtual machines. 
You need to configure the virtual machines to support Network Load Balancing (NLB). 
Which virtual machine settings should you configure?
  1. DHCP guard
  2. Port mirroring
  3. Router guard
  4. MAC address
Correct answer: D
Explanation:
For NLB to be configured you need to enable MAC address spoofing. References:http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe-29d11fcbb7ce/nlb-on-hyperv?forum=winserverhyperv
For NLB to be configured you need to enable MAC address spoofing. 
References:
http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe-29d11fcbb7ce/nlb-on-hyperv?forum=winserverhyperv
Question 2
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table. 
  
You have a virtual machine named VM1. 
You need to configure VM1 to connect to SAN1. 
What should you do first?
  1. Add one HBA
  2. Create a Virtual Fibre Channel SAN.
  3. Create a Hyper-V virtual switch.
  4. Configure network adapter teaming.
Correct answer: B
Explanation:
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows Server 2012 provides Fibre Channel ports within the guest operating system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure. With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads. Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.    
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. 
Windows Server 2012 provides Fibre Channel ports within the guest operating system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure. 
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads. 
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO. 
  
Question 3
You have a print server named Server1 that runs Windows Server 2012 R2. 
You discover that when there are many pending print jobs, the system drive occasionally runs out of free space. 
You add a new hard disk to Server1.You create a new NTFS volume. 
You need to prevent the print jobs from consuming disk space on the system volume. 
What should you modify?
  1. The properties on the new volume
  2. The properties of the Print Spooler service
  3. The Print Server Properties
  4. The properties of each shared printer
Correct answer: C
Explanation:
Windows spools print jobs by default to the following directory as they are processed:%SystemRoot%\SYSTEM32\SPOOL\PRINTERS. It is possible for the administrator of a Windows print server to manually instruct Windows the location for placing the spool files, if for example there is a concern for disk space.
Windows spools print jobs by default to the following directory as they are processed:
%SystemRoot%\SYSTEM32\SPOOL\PRINTERS. 
It is possible for the administrator of a Windows print server to manually instruct Windows the location for placing the spool files, if for example there is a concern for disk space.
Question 4
Your network contains an Active Directory forest. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2. 
You purchase a network scanner named Scanner1 that supports Web Services on Devices (WSD). 
You need to share the network scanner on Server1. 
Which server role should you install on Server1?
  1. Web Server (IIS)
  2. Fax Server
  3. Print and Document Services
  4. File and Storage Services
Correct answer: C
Explanation:
The Print and Document Services role allows for the configuration to share printers, scanners and fax devices. Print and Document Services enables you to centralize print server and network printer tasks. With this role, you can also receive scanned documents from network scanners and route the documents to a shared network resource, Windows SharePoint Services site, or email addresses. Windows Server 2012 uses Web Services on Devices (WSD) technologies to integrate scanning devices into the system. Reference:Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: Installing and Configuring servers, Objective 1.2: Configure servers, p. 8http://technet.microsoft.com/en-us/library/hh831468.aspx
The Print and Document Services role allows for the configuration to share printers, scanners and fax devices. 
Print and Document Services enables you to centralize print server and network printer tasks. With this role, you can also receive scanned documents from network scanners and route the documents to a shared network resource, Windows SharePoint Services site, or email addresses. Windows Server 2012 uses Web Services on Devices (WSD) technologies to integrate scanning devices into the system. 
Reference:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: Installing and Configuring servers, Objective 1.2: Configure servers, p. 8
http://technet.microsoft.com/en-us/library/hh831468.aspx
Question 5
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 
Server1 is configured as shown in the following table. 
  
You plan to schedule a complete backup of Server1 by using Windows Server Backup. 
You need to ensure that the state of VM1 is saved before the backup starts. 
What should you configure?
  1. NUMA topology
  2. Resource control
  3. resource metering
  4. Virtual Machine Chimney
  5. The VLAN ID
  6. Processor Compatibility
  7. The startup order
  8. Automatic Start Action
  9. Integration Services
  10. Port mirroring
  11. Single-root I/O virtualization
Correct answer: I
Explanation:
The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup. Reference:https://docs.microsoft.com/en-us/windows/win32/hyperv_v2/backing-up-and-restoring-virtual-machinesExam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144
The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup. 
Reference:
https://docs.microsoft.com/en-us/windows/win32/hyperv_v2/backing-up-and-restoring-virtual-machines
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144
Question 6
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 
Server1 is configured as shown in the following table. 
  
VM2 sends and receives large amounts of data over the network. 
You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition. 
What should you configure?
  1. NUMA topology
  2. Resource control
  3. resource metering
  4. Virtual Machine Chimney
  5. The VLAN ID
  6. Processor Compatibility
  7. The startup order
  8. Automatic Start Action
  9. Integration Services
  10. Port mirroring
  11. Single-root I/O virtualization
Correct answer: K
Explanation:
Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic. References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/hh831410.aspxExam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic. 
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question 7
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GP1 that is linked to the domain. GP1 contains a software restriction policy that blocks an application named App1. 
You have a workgroup computer named Computer1 that runs Windows 8. A local Group Policy on Computer1 contains an application control policy that allows App1. 
You join Computer1 to the domain. 
You need to prevent App1 from running on Computer1. 
What should you do?
  1. From Computer1, run gpupdate/force.
  2. From Group Policy Management, add an application control policy to GP1.
  3. From Group Policy Management, enable the Enforced option on GP1.
  4. In the local Group Policy of Computer1, configure a software restriction policy.
Correct answer: B
Explanation:
AppLocker policies take precedence over policies generated by SRP on computers that are running an operating system that supports AppLocker. AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO and local AppLocker policies or policies generated by SRP.
AppLocker policies take precedence over policies generated by SRP on computers that are running an operating system that supports AppLocker. 
AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO and local AppLocker policies or policies generated by SRP.
Question 8
Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.1. 
You create a Group Policy object (GPO) named GP1. 
You link GP1 to the AllComputers OU. 
You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. 
What should you configure?
  1. The Security settings of GP1
  2. The Block Inheritance option for AllComputers
  3. The Security settings of AllComputers
  4. The WMI filter for GP1
Correct answer: D
Explanation:
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. References:Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p. 470, 482http://technet.microsoft.com/en-us/library/jj134176
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. 
When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. 
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p. 470, 482
http://technet.microsoft.com/en-us/library/jj134176
Question 9
Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2. 
Server1 is configured as an FTP server. 
Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and dynamically requests a data port. 
On Server1, you create a firewall rule to allow connections on TCP port 21. 
You need to configure Server1 to support the client connections from App1.exe. 
What should you do?
  1. Run netsh advfirewall set global statefulftp enable.
  2. Create an inbound firewall rule to allow App1.exe.
  3. Create an outbound firewall rule to allow App1.exe.
  4. Create an isolation connection security rule.
Correct answer: A
Explanation:
The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows. In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp:Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connectionto the port number that was requested. Syntax set global statefulftp { enable | disable |notconfigured } Parameters statefulftp can be set to one of the following values:enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number. disable This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection. Not configured Valid only when netsh is configuring a GPO by using the set store command. Reference:https://portal.hostingcontroller.com/kb/a162/how-to-configure-ms-ftp-with-windows-firewall.aspx
The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows. 
In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp:
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. 
When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connectionto the port number that was requested. 
Syntax 
set global statefulftp { enable | disable |notconfigured } 
Parameters 
statefulftp can be set to one of the following values:
enable 
The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number. 
disable 
This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection. 
Not configured 
Valid only when netsh is configuring a GPO by using the set store command. 
Reference:
https://portal.hostingcontroller.com/kb/a162/how-to-configure-ms-ftp-with-windows-firewall.aspx
Question 10
Your network contains an Active Directory domain named contoso.com. 
All client devices run Windows 8.1. 
You deploy a server named Server1 that runs Windows Server 2012 R2. 
You install a new client-server application named App1 on Server1 and on the client devices. The client devices must use TCP port 6444 to connect to App1. Server1 must publish the information of App1 to an intranet server named Server2 by using TCP port 3080. 
You need to ensure that all of the client devices can connect to App1. 
Which Windows Firewall rule should you create on Server1?
  1. an inbound rule to allow a connection to TCP port 3080
  2. an outbound rule to allow a connection to TCP port 3080
  3. an outbound rule to allow a connection to TCP port 6444
  4. an inbound rule to allow a connection to TCP port 6444
Correct answer: D
Explanation:
Server1 gets request from Client PC’s it needs an inbound rule for 6444. By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program. Reference:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831755(v%3Dws.11)
Server1 gets request from Client PC’s it needs an inbound rule for 6444. 
By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. 
If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program. 
Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831755(v%3Dws.11)
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!