♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q121. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You have received instructions to convert a basic disk to a GPT disk. 

Which of the following is TRUE with regards to GPT disks? (Choose all that apply.) 

A. To convert a basic disk to a GPT disk, the disk must not contain any partitions or volumes. 

B. You can convert a basic disk to a GPT disk, regardless of partitions or volumes. 

C. GPT is required for disks larger than 2 TB. 

D. GPT is required for disks smaller than 2 TB. 

E. The GPT partition style can be used on removable media. 

F. GPT disks make use of the standard BIOS partition table. 

Answer: A,C 

Explanation: 

A. For a drive to be eligible for conversion to dynamic, all basic data partitions on the drive must be contiguous. 

C. GPT allows a much larger partition size greater than 2 terabytes (TB) D. 2 terabytes is the limit for MBR disks. 

E. Dynamic disks are not supported on portable computers, removable disks, detachable disks that use USB or IEEE 1394 interfaces. 

F. Windows only supports booting from a GPT disk on systems that contain Unified Extensible Firmware Interface (UEFI) boot firmware. Master boot record (MBR) disks use the standard BIOS partition table. GUID partition table (GPT) disks use unified extensible firmware interface (UEFI). One advantage of GPT disks is that you can have more than four partitions on each disk. GPT is also required for disks larger than 2 terabytes. Portable computers and removable media. Dynamic disks are not supported on portable computers, removable disks, detachable disks that use Universal Serial Bus (USB) or IEEE 1394 (also called FireWire) interfaces, or on disks connected to shared SCSI buses. If you are using a portable computer and right-click a disk in the graphical or list view in Disk Management, you will not see the option to convert the disk to dynamic. Dynamic disks are a separate form of volume management that allows volumes to have noncontiguous extents on one or more physical disks. Dynamic disks and volumes rely on the Logical Disk Manager (LDM) and Virtual Disk Service (VDS) and their associated features. These features enable you to perform tasks such as converting basic disks into dynamic disks, and creating fault-tolerant volumes. To encourage the use of dynamic disks, multi-partition volume support was removed from basic disks, and is now exclusively supported on dynamic disks. GPT disks can be converted to MBR disks only if all existing partitioning is first deleted, with associated loss of data. 

Q. What happens when a basic disk is converted to dynamic? 

A. For a drive to be eligible for conversion to dynamic, all basic data partitions on the drive must be contiguous. If other unrecognized partitions separate basic data partitions, the disk cannot be converted. This is one of the reasons that the MSR must be created before any basic data partitions. The first step in conversion is to separate a portion of the MSR to create the configuration database partition. All non-bootable basic partitions are then combined into a single data container partition. Boot partitions are retained as separate data container partitions. This is analogous to conversion of primary partitions. Windows XP and later versions of the Windows operating system differs from Windows 2000 in that basic and extended partitions are preferentially converted to a single 0x42 partition, rather than being retained as multiple distinct 0x42 partitions as on Windows 2000. 


Q122. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You need to add a user named User1 to a group named ServerAdmins. 

What command should you run? To answer, select the appropriate options in the answer area. 

Answer: 


Q123. - (Topic 2) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2.All servers run Windows Server 2012 R2. 

On DC2, you open Server Manager and you add Server1 as another server to manage. 

From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when you right-click Server1, you see the option to run the DHCP console. 

What should you do? 

A. In the domain, add DC2 to the DHCP Administrators group. 

B. On Server1, install the Feature Administration Tools 

C. On DC2 and Server1, run winrmquickconfig. 

D. On DC2, install the Role Administration Tools. 

Answer:

Reference: http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx 


Q124. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed.Server2 is a file server. 

Your company introduces a Bring Your Own Device (BYOD) policy. 

You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable the Device Registration Service in Active Directory. 

B. Publish the Device Registration Service by using a Web Application Proxy. 

C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service. 

D. Install the Work Folders role service on Server2. 

E. Create and configure a sync share on Server2. 

Answer: A,C 

Explanation: 

*Prepare your Active Directory forest to support devices. This is a one-time operation that you must run to prepare your Active Directory forest to support devices. To prepare the Active Directory forest On your federation server, open a Windows PowerShell command window and type: Initialize-ADDeviceRegistration *Enable Device Registration Service on a federation server farm node. To enable Device Registration Service: 

1. On your federation server, open a Windows PowerShell command window and type: Enable-AdfsDeviceRegistration. 

2.  Repeat this step on each federation farm node in your AD FS farm. 


Q125. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has three physical network adapters named NIC1, NIC2, and NIC3. 

On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10. 

You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails. 

What should you do? 

A. From Server Manager, change the load balancing mode of Team1. 

B. Run the New-NetLbfoTeam cmdlet. 

C. From Server Manager, add an interface to Team1. 

D. Run the Add-NetLbfoTeamMember cmdlet. 

Answer:


Q126. - (Topic 3) 

You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server. 

You need to ensure that client computers can establish PPTP connections to Server1. 

Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.) 

A. An inbound rule for protocol 47 

B. An outbound rule for protocol 47 

C. An inbound rule for TCP port 1723 

D. An inbound rule for TCP port 1701 

E. An outbound rule for TCP port 1723 

F. An outbound rule for TCP port 1701 

Answer: A,C 

Explanation: 

The following is a list of firewall ports which need to be opened for the various VPN tunnel 

protocols: 

For PPTP: 

IP Protocol=TCP, TCP Port number=1723 <- Used by PPTP control path 

IP Protocol=GRE (value 47) <- Used by PPTP data path 

For L2TP: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 

For SSTP: 

IP Protocol=TCP, TCP Port number=443 <- Used by SSTP control and data path 

For IKEv2: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 


Q127. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home contains the home folder of each user. 

All users have the necessary permissions to access only their home folder. 

A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that all users see only their own home folder when they access Home. 

What should you do from Server2? 

A. From Windows Explorer, modify the properties of Home. 

B. From Server Manager, modify the properties of the volume that contains Home. 

C. From Windows Explorer, modify the properties of the volume that contains Home. 

D. From Server Manager, modify the properties of Home. 

Answer:

Explanation: 

Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature based file servers to list only the files and folders to which they have allows users of Windows Server 2003 access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access. Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they don’t have access to it. 


Q128. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The network contains a DHCP server named DHCP1. 

You add a new network segment to the network. 

On the new network segment, you deploy a new server named Server1 that runs Windows 

Server 2012 R2. 

You need to configure Server1 as a DHCP Relay Agent. 

Which server role should you install on Server1? 

To answer, select the appropriate role in the answer area. 

Answer: 


Q129. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. File Server Resource Manager (FSRM) 

B. New-StoragePool 

C. Diskpart 

D. Share and Storage Management 

Answer:

Explanation: 

You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:vdisksdisk1.vdh with a maximum file size of 16 GB (or 16,000 MB). DiskPart Microsoft DiskPart version 6.1.7100 Copyright (C) 1999-2008 Microsoft Corporation. On computer: WIN7 DISKPART> create vdisk file="C:vdisksdisk1.vhd" maximum=16000 


Q130. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing printer pooling. 

Which of the following is TRUE with regards to printer pooling? (Choose all that apply.) 

A. Printers in a pool must be of the same model, and use the same printer driver. 

B. Each printer in the pool must have a different printer driver. 

C. Printer ports used in the pool must be of the same type. 

D. The types of printer ports used in the pool must be mixed. 

E. Pooled printers appear to workstations as a single printer. 

F. A minimum of three printers are required to configure a printer pool. 

Answer: A,E 

Explanation: 

You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server.