Download Installing and Configuring Windows Server 2012.70-410.CertKiller.2019-02-28.315q.vcex

Vendor: Microsoft
Exam Code: 70-410
Exam Name: Installing and Configuring Windows Server 2012
Date: Feb 28, 2019
File Size: 10 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 
An iSCSI SAN is available on the network. 
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 
You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. 
You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space. 
Which type of virtual hard disk should you create on the LUN?
  1. Dynamically expanding VHDX
  2. Fixed-size VHDX
  3. Fixed-size VHD
  4. Dynamically expanding VHD
Correct answer: B
Explanation:
The virtual disk needs to be a VHDX file since it is going to be over 2TB in size and it must be fixed-size so that the space is already taken on the server (that way the server does not run out of space as the volume grows) even if the actual virtual disk does not yet hold that amount of data.
The virtual disk needs to be a VHDX file since it is going to be over 2TB in size and it must be fixed-size so that the space is already taken on the server (that way the server does not run out of space as the volume grows) even if the actual virtual disk does not yet hold that amount of data.
Question 2
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 
On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 
  
You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. 
What should you do before you create the checkpoint?
  1. Run the Resize-VHD cmdlet.
  2. Convert Disk1.vhd to a dynamically expanding disk.
  3. Shut down VM1.
  4. Run the Convert-VHD cmdlet.
Correct answer: C
Explanation:
Changing between a fixed and dynamic disk type does not alter the size of a SNAPSHOT much at all. However, since a snapshot is a record of a VMs state at the exact time that the snapshot was taken, shutting down the VM before taking the snapshot prevents the snapshot from having to contain all of the data in RAM (as there is no data in memory when a machine is powered down). The question states that the solution should minimize the amount of disk space used for the checkpoint of VM1. If the checkpoint is taken while VM1 is running, there will be two attritional files present at the checkpoint location; a .VSV with VM1 saved state files and a .BIN file which contains VM1’s memory contents. If, however, VM1 is shut down first, these files will not be created, thus saving disk space. In order to convert Disk1.vhd to a dynamically expanding disk, VM1 still have to be shut down.
Changing between a fixed and dynamic disk type does not alter the size of a SNAPSHOT much at all. 
However, since a snapshot is a record of a VMs state at the exact time that the snapshot was taken, shutting down the VM before taking the snapshot prevents the snapshot from having to contain all of the data in RAM (as there is no data in memory when a machine is powered down). 
The question states that the solution should minimize the amount of disk space used for the checkpoint of VM1. If the checkpoint is taken while VM1 is running, there will be two attritional files present at the checkpoint location; a .VSV with VM1 saved state files and a .BIN file which contains VM1’s memory contents. If, however, VM1 is shut down first, these files will not be created, thus saving disk space. 
In order to convert Disk1.vhd to a dynamically expanding disk, VM1 still have to be shut down.
Question 3
You have a print server named Server1 that runs Windows Server 2012 R2. 
You discover that when there are many pending print jobs, the system drive occasionally runs out of free space. 
You add a new hard disk to Server1.You create a new NTFS volume. 
You need to prevent the print jobs from consuming disk space on the system volume. 
What should you modify?
  1. The properties on the new volume
  2. The properties of the Print Spooler service
  3. The Print Server Properties
  4. The properties of each shared printer
Correct answer: C
Explanation:
Windows spools print jobs by default to the following directory as they are processed:%SystemRoot%\SYSTEM32\SPOOL\PRINTERS. It is possible for the administrator of a Windows print server to manually instruct Windows the location for placing the spool files, if for example there is a concern for disk space.
Windows spools print jobs by default to the following directory as they are processed:
%SystemRoot%\SYSTEM32\SPOOL\PRINTERS. 
It is possible for the administrator of a Windows print server to manually instruct Windows the location for placing the spool files, if for example there is a concern for disk space.
Question 4
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 
On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain. 
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. 
What should you do on Core1?
  1. Run the Disable NetFirewallRule cmdlet.
  2. Install Remote Server Administration Tools (RSAT).
  3. Install Windows Management Framework.
  4. Run the Enable-Com + Network Access Firewall Rule.
Correct answer: D
Explanation:
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the NetFirewallRule command. This will allow you to view the event logs.
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the NetFirewallRule command. This will allow you to view the event logs.
Question 5
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup. 
On Server1 and Server2, you create a local user account named Admin1.You add the account to the local Administrators group. On both servers, Admin1 has the same password. 
You log on to Server1 as Admin1. You open Computer Management and you.connect to Server2. 
When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages. 
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management. 
What should you configure on Server2?
  1. From Server Manager, modify the Remote Management setting.
  2. From Local Users and Groups, modify the membership of the Remote Management Users group.
  3. From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.
  4. From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value.
Correct answer: D
Explanation:
The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely administer the computer.
The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely administer the computer.
Question 6
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 
Server1 is configured as shown in the following table. 
  
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). 
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. 
Which virtual machine setting should you configure for VM2?
  1. NUMA topology
  2. Resource control
  3. resource metering
  4. virtual Machine Chimney
  5. The VLAN ID
  6. Processor Compatibility
  7. The startup order
  8. Automatic Start Action
  9. Integration Services
  10. Port mirroring
  11. Single-root I/O virtualization
Correct answer: G
Explanation:
Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspxExam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. 
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question 7
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 
Server1 is configured as shown in the following table. 
  
VM2 sends and receives large amounts of data over the network. 
You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition. 
What should you configure?
  1. NUMA topology
  2. Resource control
  3. resource metering
  4. virtual Machine Chimney
  5. The VLAN ID
  6. Processor Compatibility
  7. The startup order
  8. Automatic Start Action
  9. Integration Services
  10. Port mirroring
  11. Single-root I/O virtualization
Correct answer: K
Explanation:
Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic. References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/hh831410.aspxExam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic. 
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question 8
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 
Server1 is configured as shown in the following table. 
  
You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load. 
What should you configure?
  1. NUMA topology
  2. Resource control
  3. resource metering
  4. virtual Machine Chimney
  5. The VLAN ID
  6. Processor Compatibility
  7. The startup order
  8. Automatic Start Action
  9. Integration Services
  10. Port mirroring
  11. Single-root I/O virtualization
Correct answer: B
Explanation:
Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines. References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/hh831410.aspxhttp://technet.microsoft.com/en-us/library/cc742470.aspxExam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines. 
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
http://technet.microsoft.com/en-us/library/cc742470.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question 9
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GP1 that is linked to the domain. GP1 contains a software restriction policy that blocks an application named App1. 
You have a workgroup computer named Computer1 that runs Windows 8. A local Group Policy on Computer1 contains an application control policy that allows App1. 
You join Computer1 to the domain. 
You need to prevent App1 from running on Computer1. 
What should you do?
  1. From Computer1, run gpupdate/force.
  2. From Group Policy Management, add an application control policy to GP1.
  3. From Group Policy Management, enable the Enforced option on GP1.
  4. In the local Group Policy of Computer1, configure a software restriction policy.
Correct answer: B
Explanation:
AppLocker policies take precedence over policies generated by SRP on computers that are running an operating system that supports AppLocker. AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO and local AppLocker policies or policies generated by SRP.
AppLocker policies take precedence over policies generated by SRP on computers that are running an operating system that supports AppLocker. 
AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO and local AppLocker policies or policies generated by SRP.
Question 10
Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.1. 
You create a Group Policy object (GPO) named GP1. 
You link GP1 to the AllComputers OU. 
You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. 
What should you configure?
  1. The Security settings of GP1
  2. The Block Inheritance option for AllComputers
  3. The Security settings of AllComputers
  4. The WMI filter for GP1
Correct answer: D
Explanation:
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. References:Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p.470, 482http://technet.microsoft.com/en-us/library/jj134176WMI filtering using GPMC
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. 
When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. 
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p.470, 482
http://technet.microsoft.com/en-us/library/jj134176
WMI filtering using GPMC
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!