QUESTION 161

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper- V server role installed. You need to log the amount of system resources used by each virtual machine. What should you do?

 

A.

From Windows PowerShell, run the Enable-VMRe5ourceMetering cmdlet.

B.

From Windows System Resource Manager, enable Accounting.

C.

From Windows System Resource Manager, add a resource allocation policy.

D.

From Windows PowerShell, run the Measure-VM cmdlet.

 

Correct Answer:
A

Explanation:

Route is used to view and modify the IP routing table.

Route Print displays a list of current routes that the host knows. Default gateways are important to make IP routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote networksegments. In this way, individual hosts are freed of the burden of having to maintain extensive andcontinuously updated knowledge about individual remote IP network segments. Only the router that acts as thedefault gateway needs to maintain this level of routing knowledge to reach other remote network segments inthe larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To preventthis, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection tospecify multiple default gateways. You can also use the route command to manually add routes to therouting table for heavily used hosts or networksIf you have multiple interfaces and you configure a default gateway for each interface, TCP/IP by

defaultautomatically calculates an interface metric that is based on the speed of the interface. The interface metricbecomes the metric of the default route in the routing table for the configured default gateway. The interfacewith the highest speed has the lowest metric for its default route. The result is that whenever multiple defaultgateways are configured on multiple interfaces, the fastest interface will be used to forward traffic to its defaultgateway.

If multiple interfaces of the same speed have the same lowest interface metric, then, based upon the bindingorder, the default gateway of the first network adapter is used. The default gateway for the second networkadapter is used when the first is unavailable. In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing tableto see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IPtraffic for Host B to its own default gateway, IP Router 1.

 

clip_image002

 

http://technet.microsoft.com/en-us/library/cc779696%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/cc958877.aspx http://support.microsoft.com/kb/299540/en-us

 

 

QUESTION 162

You have a server named Server1 that runs Windows Server 2012 R2.

You plan to create an image of Server1. You need to remove the source files for all server roles that are not installed on Server1. Which tool should you use?

 

A.

servermanagercmd.exe

B.

imagex.exe

C.

dism.exe

D.

ocsetup.exe

 

Correct Answer: C

Explanat
ion:

servermanagercmd.exe – The ServerManagerCmd.exe command-line tool has been deprecated in WindowsServer 2008 R2. imagex.exe – ImageX is a command-line tool in Windows Vista that you can use to create and manageWindows image (.wim) files. A .wim file contains one or more volume images, disk volumes that containimages of an installed Windows operating system. dism.exe – Deployment Image Servicing and Management (DISM.exe) is a command-line tool that canbe used to service a Windows image or to prepare a Windows Preinstallation Environment (WindowsPE) image. It replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg that were included in

Windows Vista

The functionality that was included in these tools is now consolidated in one tool(DISM.exe), and new functionality has been added to improve the experience for offline servicing. DISMcan Add, remove, and enumerate packages. ocsetup.exe – The Ocsetup.exe tool is used as a wrapper for Package Manager (Pkgmgr.exe) and for WindowsInstaller (Msiexec.exe). Ocsetup.exe is a command-line utility that can be used to perform scripted installs andscripted uninstalls of Windows optional components. The Ocsetup.exe tool replaces the Sysocmgr.exe tool thatWindows XP and Windows Server 2003i use.

 

clip_image004

 

http://technet.microsoft.com/en-us/library/hh824822.aspx http://blogs.technet.com/b/joscon/archive/2010/08/26/adding-features-with-dism.aspx http://technet.microsoft.com/en-us/library/hh831809.aspx

http://technet.microsoft.com/en-us/library/hh825265.aspx

 

 

QUESTION 163

Your network contains an Active Directory domain named contoso.com.

An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit. (Click the Exhibit button.)

 

clip_image006

 

You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort.

Which tool should you use?

 

A.

csvde

B.

Net user

C.

Ldifde

D.

Dsadd

 

Correct Answer: A

Explanation:

csvde – Imports and exports data from Active Directory Domain Services (AD DS) using files thatstore data in the comma-separated value (CSV) format. You can also support batch operations based on the CSV file format standard.

http://technet.microsoft.com/en-us/library/cc732101(v=ws.10).aspx

Net user – Adds or modifies user accounts, or displays user account information.

http:// technet.microsoft.com/en-us/library/cc771865(v=ws.10).aspx

Ldifde – Creates, modifies, and deletes directory objects. You can also use ldifde to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory Domain Services (AD DS) with data from other directory services.

http://technet.microsoft.com/ en-us/library/cc731033(v=ws.10).aspx

Dsadd – Adds specific types of objects to the directory.

http://technet.microsoft.com/en-us/library/cc753708 (v=ws.10).aspx

csvde.exe is the best option to add multiple users. as you just need to export the excel spreadsheet as a csv file and make sure the parameters are correct.

You can use Csvde to import and export Active Directory data that uses the comma-separated value format. Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the header and value information

 

clip_image008

< font style="font-size: 10pt" color="#000000"> 

http://support.microsoft.com/kb/327620/en-us

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 164

HOTSPOT

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8. An administrator creates an application control policy and links the policy to an organizational unit (OU) named OU1. The application control policy contains several deny rules. The deny rules apply to the Everyone group. You need to prevent users from running the denied application. What should you configure? To answer, select the appropriate object in the answer area.

 

clip_image010

 

Correct Answer:

 

clip_image012

 

Explanation:

To enable the Enforce rules enforcement setting by using the Local Security Policy snap-in

1. Click Start, type secpol.msc in the Search programs and files box, and then press ENTER.

2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.

3. In the console tree, double-click Application Control Policies, right-click AppLocker, and then click Properties.

4. On the Enforcement tab, select the Configured check box for the rule collection that you want to enforce, and then verify that Enforce rules is selected in the list for that rule collection.

5. Repeat step 4 to configure the enforcement setting to Enforce rules for additional rule collections.

6. Click OK.

http://technet.microsoft.com/en-us/library/ee791885(v=ws.10).aspx

 

 

QUESTION 165

You have a print server named Server1 that runs Windows Server 2012 R2.

You discover that when there are many pending print jobs, the system drive occasionally runs out of free space. You add a new hard disk to Server1. You create a new NTFS volume. You need to prevent the print jobs from consuming disk space on the system volume.

What should you modify?

 

A.

the properties of the Print Spooler service

B.

the Print Server Properties

C.

the properties of each shared printer

D.

the properties on the new volume

 

Correct Answer: B

Explanation:

Windows spools print jobs by default to the following directory as the they are processed:

%SystemRoot%\SYSTEM32\SPOOL\PRINTERS.

It is possible for the administrator of a Windows print server to manually instruct Windows the location forplacing the spool files, if for example there is a concern for disk space.

 

clip_image014

 

http://support.microsoft.com/kb/137503/en-us

http://technet.microsoft.com/en-us/library/cc757764%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/cc736979%28v=ws.10%29.aspx

 

 

 

 

 

QUESTION 166

Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports.

On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic -Direction Outbound -LocalPort 1024- 65535 -Protocol TCP

Users report that they can no longer connect to Server1 by using Appl. You need to ensure that App1 can connect to Server1. What should you run on Server1?

 

A.

Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow

B.

netsh advfirewall firewall set rule name=allowdynamic new action = allow

C.

Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound

D.

netsh advfirew
all firewall add rule name=allowdynamic action=allow

 

Correct Answer: C

Explanation:

Set-NetFirewallRule – Modifies existing firewall rules. You have to allow the connection INTO the server – inbound rules

 

clip_image016

 

http://technet.microsoft.com/en-us/library/jj573828%28v=wps.620%29.aspx http://mikefrobbins.com/2013/02/28/use-powershell-to-remotely-enable-firewall-exceptionson- windows-server-2012/

 

QUESTION 167

You have a server named dc2.contoso.com that runs Windows Server 2012 R2 and has the DNS Server server role installed.

You open DNS Manager as shown in the exhibit. (Click the Exhibit button.)

 

clip_image018

 

You need to view the DNS server cache from DNS Manager.

What should you do first?

 

A.

From the View menu, click Advanced.

B.

From the Action menu, click Configure a DNS Server…

C.

From the View menu, click Filter…

D.

From the Action menu, click Properties.

 

Correct Answer: A

Explanation:

To view the contents of the DNS cache, perform the following steps:

1. Start the Microsoft Management Console (MMC) DNS snap-in (Go to Start, Programs, Administrative Tools,and click DNS).

2. From the View menu, select Advanced.

3. Select the Cached Lookups tree node from the left-hand pane to display the top-level domains (e.g., com, net) under.(root). Expand any of these domains to view the cached DNS information (the actual records willappear in the right-hand pane).

 

 

 

clip_image020

clip_image022

 

 

 

 

 

 

 

 

 

QUESTION 168

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 R2 installed.

ENSUREPASS.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online.

You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine.

Which of the following is TRUE with regards to connecting a physical disk to a virtual machine?

 

A.

The physical disk should not be online.

B.

The physical disk should be uninstalled and re-installed.

C.

The physical disk should be configured as a striped disk.

D.

The physical disk should be configured as a mirrored disk.

 

Correct Answer: A

Explanation:

Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a “pass-through” disk connected to a virtual machine.)

The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine.

The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk.

Pass-through Disk Configuration

Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective

http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper-v.aspx

http://technet.microsoft.com/pt-pt/library/ff404147%28v=ws.10%29.aspx

 

 

QUESTION 169

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

You create a new inbound rule by using Windows Firewall with Advanced Security.

You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.

Which setting in the rule should you configure?

 

A.

Edge traversal

B.

Authorized computers

C.

Interface types

D.

Remote
IP address

 

Correct Answer: A

Explanation:

Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device.

 

clip_image024

 

Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal -Allow applications to receive unsolicited traffic directly from the Internetthrough a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device.

http://technet.microsoft.com/en-us/library/cc731927.aspx

http://technet.microsoft.com/en-us/library/dd421713%28v=ws.10%29.aspx

 

 

 

 

 

QUESTION 170

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File Server server role installed. On Server1, you create a share named Documents. You need to ensure that users can recover files that they accidently delete from Documents. What should you do?

 

A.

Enable shadow copies by using Computer Management.

B.

Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.

C.

Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).

D.

Create a storage pool that contains a two-way mirrored volume by using Server Manager.

 

Correct Answer: A

Explanation:

If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduledto create shadow copies at 7:00 A.M of next business day. The default storage area will be on the samevolume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot selectspecific shared folders and files on a volume to be copied or not copied. To enable and configure Shadow Copies of Shared Folders

1. Click Start, point to Administrative Tools, and then click Computer Management.

2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies.

3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable.

4. You will see an alert that Windows will create a shadow copy now with the current settings and that thesettings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if youwant to select a different volume or settings.

5. To make changes to the default schedule and storage area, click Settings.

clip_image026

 

http://technet.microsoft.com/en-us/library/cc771893.aspx

 

Free VCE & PDF File for Microsoft 70-410 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…