[2016-New] Microsoft 70-410 Exam Dump Free Updation Availabe In GreatExam (171-190)

No doubt that 70-410 exam is a worth challenging task but you should not feel hesitant against the confronting difficulties. GreatExam is supplying the new version of 70-410 VCE dumps now. Get a complete hold on 70-410 exam syllabus through GreatExam and boost up your skills. What’s more, the 70-410 dumps are the latest. It would be great helpful to your 70-410 exam.

QUESTION 171
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?

A.    Edge traversal
B.    Authorized computers
C.    Interface types
D.    Remote IP address

 

Answer: A
Explanation:
Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device.
Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal -Allow applications to receive unsolicited traffic directly from the Internetthrough a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device.
http://technet.microsoft.com/en-us/library/cc731927.aspx
http://technet.microsoft.com/en-us/library/dd421713%28v=ws.10%29.aspx

QUESTION 172
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File Server server role installed. On Server1, you create a share named Documents.
You need to ensure that users can recover files that they accidently delete from Documents.
What should you do?

A.    Enable shadow copies by using Computer Management.
B.    Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.
C.    Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).
D.    Create a storage pool that contains a two-way mirrored volume by using Server Manager.

Answer: A
Explanation:
If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduledto create shadow copies at 7:00 A.M of next business day. The default storage area will be on the samevolume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot selectspecific shared folders and files on a volume to be copied or not copied. To enable and configure Shadow Copies of Shared Folders
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies.
3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable.
4. You will see an alert that Windows will create a shadow copy now with the current settings and that thesettings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if youwant to select a different volume or settings.
5. To make changes to the default schedule and storage area, click Settings.
http://technet.microsoft.com/en-us/library/cc771893.aspx

QUESTION 173
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
– IP address: 10.1.1.1
– Subnet mask: 255.255.240.0
– Default gateway: 10.1.1.254
What should you run?

A.    netsh.exe
B.    netcfg.exe
C.    msconfig.exe
D.    ipconfig.exe

Answer: A
Explanation:
In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe.
Incorrect:
not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP configuration. Modern servers typically come with several network interface ports. This causes IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the output if IPCONFIG.EXE to a file and view it with Notepad.exe.

QUESTION 174
Your network contains an Active Directory domain named contoso.com. The domain contains three member servers. The servers are configured as shown in the following table.
1741
All client computers run Windows 8. All client computers receive updates from Server2.
On Servers, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is not included in the Windows 8 installation media.
You need to ensure that when users connect to the printer for the first time, the printer driver is installed automatically on their client computer.
What should you do?

A.    From the Windows Deployment Services console on Server1, add the driver package for Printer1.
B.    From the Update Services console on Server2, import and approve updates.
C.    From Windows PowerShell on Server3, run the Add-PrinterDriver cmdlet.
D.    From the Print Management console on Server3, add additional drivers for Printer1.

Answer: D
Explanation:
Print and Document Services enables you to centralize print server and network printer tasks. With this role, you can also receive scanned documents from network scanners and route the documents to a shared network resource, Windows SharePoint Services site, or email addresses.
Starting with Windows 8 and Server 2012 R2 – here comes the Version 4 drivers (class driver or model specific driver) which changes a couple of things, a system that allows people to install their printers without having to locate a driver for that device, in many cases.
1. There is no v3 driver support for Windows on ARM
2. The print server is no longer a software distribution mechanism
3. Group Policy Preference TCP/IP printers do not support Type 4 print drivers
4. The LPR/LPD protocol is deprecated and will eventually be removed
To install v4 drivers using the Print Management Console
1. Open the Print Management Console by opening Server Manager, click Tools, and then click Print Management.
2. Expand Print Servers, and then expand the Print Server name. Right click Drivers and select Add Drivers.
3. To add a v4 driver for a device, select the driver that has v4 or Class Driver in the name.
Once installed, v4 drivers are identified by the Version field displayed in the Driver Properties:
The driver name will state Class Driver, the Config File should show PrintConfig.dll, and the driver path should be %systemroot%\system32\DriverStore.
Class Drivers – V4 drivers that ship with Windows Server 2012 R2 are known as Class Drivers. Drivers of this type should always display Class Driver in the name.
Model Specific Drivers – V4 drivers that are downloaded directly from a printer manufacturer website or downloaded from Windows Update are known as model specific drivers.
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here Name “HP Color LaserJet 5550 PS Class Driver”
because of formatting constraints. Add-PrinterDriver –
http://technet.microsoft.com/en-us/library/hh831468.aspx
http://technet.microsoft.com/en-us/library/jj134163.aspx
http://technet.microsoft.com/en-us/library/hh831769.aspx
http://blogs.technet.com/b/askperf/archive/2012/11/03/windows-8-windows-server-2012-what-s-new-with- printing-in-windows-8.aspx

QUESTION 175
Your network contains an Active Directory domain named contoso.com.
The domain contains 20 computer accounts in an organizational unit (OU) named OU1.
A user account named User1 is in an OU named OU2.
You are configuring a Group Policy object (GPO) named GPO1.
You need to assign User1 the Back up files and directories user right to all of the computer accounts in OU1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Link GPO1 to OU1.
B.    Link GPO1 to OU2.
C.    Modify the Delegation settings of GPO1.
D.    From User Configuration in GPO1, modify the security settings.
E.    From Computer Configuration in GPO1, modify the security settings.

Answer: AE
Explanation:
A. You have to Link a GPO to an object in order for it to be Applied to that object
B. Wrong object to link the GPO
C. Delegation settings refer to delegating control over the properties of the GPO
D. User Configuration typically contains subitems for Software Settings, Windows Settings, and AdministrativeTemplates
E. Backup Files and Directories are found in Computer Configuration\Windows Settings\Local Policies\User Rights Assignment Back up files and directories – This user right determines which users can bypass file and directory, registry,and other persistent object permissions for the purposes of backing up the system.
Specifically, this user right is similar to granting the following permissions to the user or group in question on allfiles and folders on the system:
Traverse Folder/Execute File
List Folder/Read Data
Read Attributes
Read Extended Attributes
Read Permissions
Caution: Assigning this user right can be a security risk. Since there is no way to be sure that a user is backing up data, stealing data, or copying data to be distributed, only assign this user right to trusted users.
Default on workstations and servers: Administrators, Backup Operators.
Default on domain controllers:Administrators,Backup Operators,Server Operators
http://www.microsoft.com/en-us/download/details.aspx?id=25250

QUESTION 176
You have an existing Active Directory site named Site1.
You create a new Active Directory site and name it Site2.
You need to configure Active Directory replication between Site1 and Site2.
You install a new domain controller.
You create the site link between Site1 and Site2.
What should you do next?

A.    Use the Active Directory Sites and Services console to configure a new site link bridge object.
B.    Use the Active Directory Sites and Services console to decrease the site link cost between Site1
and Site2.
C.    Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the
new domain controller object to Site2.
D.    Use the Active Directory Sites and Services console to configure the new domain controller as a
preferred bridgehead server for Site1.

Answer: C
Explanation:
http://www.enterprisenetworkingplanet.com/netsysm/article.php/624411/Intersite-Replication.htm
Inter-site Replication
The process of creating a custom site link has fivebasic steps:
1. Create the site link.
2. Configure the site link’s associated attributes.
3. Create site link bridges.
4. Configure connection objects. (This step is optional.)
5. Designate a preferred bridgehead server. (This step is optional)
http://technet.microsoft.com/en-us/library/cc759160%28v=ws.10%29.aspx
Replication between sites

QUESTION 177
Your company has an Active Directory forest. Not all domain controllers in the forest are configured as Global Catalog Servers. Your domain structure contains one root domain and one child domain. You modify the folder permissions on a file server that is in the child domain.
You discover that some Access Control entries start with S-1-5-21 and that no account name is listed.
You need to list the account names. What should you do?

A.    Move the RID master role in the child domain to a domain controller that holds the Global Catalog.
B.    Modify the schema to enable replication of the friendlynames attribute to the Global Catalog.
C.    Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog.
D.    Move the infrastructure master role in the child domain to a domain controller that does not hold the
Global Catalog.

Answer: D
Explanation:
If the IM Flexible Single Master Operation (FSMO) role holder is also a global catalog server, the phantom indexes are never created or updated on that domain controller. (The FSMO is also known as the operations master.) This behavior occurs because a global catalog server contains a partial replica of every object in Active Directory. The IM does not store phantom versions of the foreign objects because it already has a partial replica of the object in the local global catalog.
For this process to work correctly in a multidomain environment, the infrastructure FSMO role holder cannot be a global catalog server. Be aware that the first domain in the forest holds all five FSMO roles and is also a global catalog. Therefore, you must transfer either role to another computer as soon as another domain controller is installed in the domain if you plan to have multiple domains.

QUESTION 178
Your company has an Active Directory domain.
You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC).
You need to access the Active Directory Schema snap-in.
What should you do?

A.    Register Schmmgmt.dll.
B.    Log off and log on again by using an account that is a member of the Schema Admins group.
C.    Use the Ntdsutil.exe command to connect to the schema master operations master and open the
schema for writing.
D.    Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by
using Server Manager.

Answer: A
Explanation:
Install the Active Directory Schema Snap-In
You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active Directory Schema snap-in.
You can then add the snap-in to Microsoft Management Console (MMC).
To install the Active Directory Schema snap-in
1. To open an elevated command prompt, click Start , type command prompt and then right-click Command Prompt when it appears in the Start menu. Next, click Run as administrator and then click OK .
To open an elevated command prompt in Windows Server 2012 R2, click Start , type cmd , right clickcmd and then click Run as administrator .
2. Type the following command, and then press ENTER:
regsvr32 schmmgmt.dll
3. Click Start , click Run , type mmc and then click OK .
4. On the File menu, click Add/Remove Snap-in .
5. Under Available snap-ins , click Active Directory Schema , click Add and then click OK .
6. To save this console, on the File menu, clickSave .
7. In the Save As dialog box, do one of the following:
* To place the snap-in in the Administrative Tools folder, in File name , type a name for the snap-in, and then click Save .
* To save the snap-in to a location other than the Administrative Tools folder, in Save in, navigate to a location for the snap-in. In File name , type a name for the snap-in, and then click Save .

QUESTION 179
Your network contains a domain controller that is configured as a DNS server.
The server hosts an Active Directory-integrated zone for the domain.
You need to reduce how long it takes until stale records are deleted from the zone.
What should you do?

A.    From the configuration directory partition of the forest, modify the tombstone lifetime.
B.    From the configuration directory partition of the forest, modify the garbage collection interval.
C.    From the aging properties of the zone, modify the no-refresh interval and the refresh interval.
D.    From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.

Answer: C
Explanation:
Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance.

QUESTION 180
You have an Active Directory domain named contoso.com.
You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. (Click the Exhibit button.)
You discover that stale resource records are not automatically removed from the contoso.com zone. You need to ensure that the stale resource records are automatically removed from the
contoso.com zone.
What should you do?
1801

A.    Set the scavenging period of Server1 to 0 days.
B.    Modify the Server Aging/Scavenging properties.
C.    Configure the aging properties for the contoso.com zone.
D.    Convert the contoso.com zone to an Active Directory-integrated zone.

Answer: C
Explanation:
Scavenging or aging as it is also known as automates the deletion of old records. When scavenging is disabled, these records must be deleted manually or the size of the DNS database can become large and have an adverse effect on performance. In the exhibit it shows that scavenging is enabled on Server1, thus you should configure the aging properties for the zone.

QUESTION 181
Hotspot Question
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server2 has the Windows Deployment Services server role installed. On Server1, you have a virtual machine named VM1.
You plan to deploy an image to VM1 by using Windows Deployment Services (WDS).
You need to ensure that VM1 can connect to Server1 by using PXE.
Which settings should you configure on VM1? To answer, select the appropriate settings in the answer area.
1811
Answer:
1812
Explanation:
Virtual machines can be deployed to Hyper-V using Windows Deployment Services (WDS). To accomplish this requires the proper WDS infrastructure be in place and that the VM PXE boot using a Legacy Network Adapter. By default, there is only a “Standard Network Adapter” installed on the Virtual Machine, but for PXE functionality you will need to add a “Legacy Network Adapter”.
Go to the “Legacy Network Adapter” that you just added and specify that it should use the Virtual Switch that you just created.
Last but not least, you should change the BIOS boot priority to make sure that the Virtual Machine always tries to boot first using the “Legacy Network Adapter”.
Just select the “Legacy Network Adapter” and move it to the top using the buttons.
Start your Virtual Machine and now PXE boot should work
http://www.danielclasson.com/guide-how-to-get-pxe-boot-to-work-in-hyper-v/ http://blogs.technet.com/b/askcore/archive/2008/11/25/installing-a-vm-operating-system-using-a-legacy- network-adapter-and-pxe-boot.aspx

QUESTION 182
Hotspot Question
Your network contains an Active Directory domain named contoso.com.
You need to identify whether the Company attribute replicates to the global catalog.
Which part of the Active Directory partition should you view? To answer, select the appropriate Active Directory object in the answer area.
1821
Answer:
1822
Explanation:
Schema -Contains the Schema container, which stores class and attribute definitions for all existing and possible Active Directory objects in cn=schema,cn=configuration,dc= forestRootDomain . Updates to this container are replicated to all domain controllers in the forest. You can view the contents of the Schema container in the Active Directory Schema console.
http://technet.microsoft.com/en-us/library/cc961591.aspx

QUESTION 183
Hotspot Question
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the Windows Deployment Services (WDS) server role installed.
You install the DHCP Server server role on Server1.
You need to ensure that Server1 can respond to DHCP clients and WDS clients.
What should you configure for the DHCP service and the WDS service?
To answer, configure the appropriate options in the answer area.
1831
Answer:
1832
Explanation:
Traditionally, only DHCP listened on port UDP 67, but now WDS also listens on port UDP 67 WDS and DHCP are installed on the same server: You must tell WDS not to listen on port UDP 67, leaving it available for DHCP traffic only. But then how does the client find the WDS server? You set option 60 in DHCP.
The DHCP option 60, when set to “PXEClient” is used only to instruct the PXE clients to try to use a PXE Service bound on UDP port 4011. Actually, if there is a bootp or dhcp service bound on UDP port 67 of an host (usually called a server), a PXE service cannot bind on that port on that host. Since the PXE Service uses BOOTP/DHCP packets to send the options 66 and 67 to the clients, it needs to be able to bind to the associated port (bootps) or to an alternated port (4011) that the clients know they must use as the alternate port. And to instruct the clients to use this alternate port, you have to set dhcp option 60 to “PXEClient”.
If Windows Deployment Services and DHCP are running on the same computer, configuring Windows Deployment Services to not respond to any client computers will not work. This is because although Windows Deployment Services will not respond, DHCP will. You should disable WDS if you have both installed and using DHCP.
To configure Windows Deployment Services to run on the same computer as Microsoft DHCP
Right-click the server and click Properties.On the DHCP tab, select Do not listen on port 67 and Configure DHCP Option #60 Tag to PXEClient.
This procedure does the following: Sets
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WDSServer\Parameters \UseDhcpPorts to 0. Adds the option 60 PXEClient tag to all of your DHCP scopes.
http://gallery.technet.microsoft.com/DHCP-Option-60-Configuratio-2cad825d

QUESTION 184
Hotspot Question
You have a server named Server1. Server1 runs Windows Server 2012 R2. A user named Admin1 is a member of the local Administrators group.
You need to ensure that Admin1 receives a User Account Control (UAC) prompt when attempting to open Windows PowerShell as an administrator.
Which setting should you modify from the Local Group Policy Editor? To answer, select the appropriate setting in the answer area.
1841

Answer:
1842

QUESTION 185
You have a server that runs Windows Server 2012 R2.
The server contains the disks configured as shown in the following table.
1851
You need to create a volume that can store up to 3 TB of user files.
The solution must ensure that the user files are available if one of the disks in the volume fails.
What should you create?

A.    a storage pool on Disk 2 and Disk 3
B.    a spanned volume on Disk 2 and Disk 3
C.    a mirrored volume on Disk 1 and Disk 3
D.    a mirrored volume on Disk 2 and Disk 3
E.    a RAID-5 volume on Disk 1, Disk 2, and Disk 3
F.    a storage pool on Disk 1 and Disk 3
G.    a spanned volume on Disk 0 and Disk 4
H.    a mirrored volume on Disk 1 and Disk 4

Answer: D

QUESTION 186
You have a server that runs Windows Server 2012 R2.
The server contains the disks configured as shown in the following table.
1861
You need to create a volume that can store up to 3 TB of user files.
The solution must ensure that the user files are available if one of the disks in the volume fails.
What should you create?

A.    A mirrored volume on Disk 1 and Disk 4
B.    A storage pool on Disk 2 and Disk 3
C.    A storage pool on Disk 1 and Disk 3
D.    A mirrored volume on Disk 2 and Disk 3

Answer: D
A mirrored volume provides an identical twin of the selected volume. All data written to the mirrored volume is written to both volumes, which results in disk capacity of only 50 percent.
Any volume can be mirrored, including the system and boot volumes. The disk that you select for the shadow volume does not need to be identical to the original disk in size, or in its number of tracks and cylinders. This means that you do not have to replace a failed disk with an identical model. The unused area that you select for the shadow volume cannot be smaller than the original volume. If the area that you select for the shadow volume is larger than the original, the extra space on the shadow disk can be configured as another volume.
Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).
The following operations can be performed only on dynamic disks:
Create and delete simple, spanned, striped, mirrored, and RAID-5 volumes.
Extend a simple or spanned volume.
Remove a mirror from a mirrored volume or break the mirrored volume into two volumes.
Repair mirrored or RAID-5 volumes.
Reactivate a missing or offline disk.
You need at least two dynamic disks to create a mirrored volume.
Mirrored volumes are fault tolerant and use RAID-1, which provides redundancy by creating two
identical copies of a volume.
Mirrored volumes cannot be extended.
Both copies (mirrors) of the mirrored volume share the same drive letter.
http://technet.microsoft.com/en-us/library/cc779765%28v=ws.10%29.aspx
http://msdn.microsoft.com/en-us/library/windows/desktop/aa363785%28v=vs.85%29.aspx
http://technet.microsoft.com/en-us/library/cc938487.aspx

QUESTION 187
Hotspot Question
Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. All client computers run Windows 7. The computer accounts for all of the client computers are located in an organizational unit (OU) named OU1. An administrator links a Group Policy object (GPO) to OU1. The GPO contains several application control policies.
You discover that the application control policies are not enforced on the client computers.
You need to modify the GPO to ensure that the application control policies are enforced on the client computers.
What should you configure in the GPO? To answer, select the appropriate service in the answer area.
1871
Answer:
1872
Explanation:
Does AppLocker use any services for its rule enforcement?
Yes, AppLocker uses the Application Identity service (AppIDSvc) for rule enforcement.
For AppLocker rules to be enforced, this service must be set to start automatically in the GPO.
http://technet.microsoft.com/en-us/library/ee619725%28v=ws.10%29.aspx

QUESTION 188
Your network contains an Active Directory domain named contoso.com.
The domain contains three servers named Server1, Served, and Server3.
You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit. (Click the Exhibit button.)
1881
You need to ensure that Server2 can be managed remotely by using Server Manager.
What should you do?

A.    On DC1, run the Enable-PSSessionConfiguration cmdlet.
B.    On Server2, run the Add-Computer cmdlet.
C.    On Server2/ modify the membership of the Remote Management Users group.
D.    From Active Directory Users and Computers, add a computer account named Server2, and then
restart Server2.

Answer: C
Explanation:
This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group.
Note:
* Name: BUILTIN\Remote Management Users
Description: A Builtin Local group. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.
* Enable-ServerManagerStandardUserRemoting
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing by using Server Manager.
Syntax:
Parameter Set: Default
Enable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-Confirm] [-WhatIf] [ <CommonParameters>]
Detailed Description
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing, either locally or remotely, by using Server Manager. The cmdlet must be run locally on the server that you are managing by using Server Manager. The cmdlet works by performing the following actions:
Adds access rights for specified standard users to the root\cimv2 namespace on the local server (for access to role and feature inventory information).
Adds specified standard users to required user groups (Remote Management Users, Event Log Readers, and Performance Log Readers) that allow remote access to event and performance counter logs on the managed server.
Changes access rights in the Service Control Manager to allow specified standard users remote access to the status of services on the managed server.
Incorrect:
Not A: the Enable-PSSessionConfiguration.This is an advanced cmdlet that is designed to be used by system administrators to manage customized session configurations for their users.
Reference: Enable-ServerManagerStandardUserRemoting

QUESTION 189
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You create a LUN on the SAN.
You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN.
What should you configure?

A.    A fixed-size VHDX
B.    A fixed-size VHD
C.    A dynamically expanding VHD
D.    A dynamically expanding VHDX
E.    A pass-through disk

Answer: E
Explanation:
You can use physical disks that are directly attached to a virtual machine as a storage option on themanagement operating system. This allows virtual machines to access storage that is mapped directly to theserver running Hyper-V without first configuring the volume. The storage can be either a physical disk which isinternal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logicalreference to a portion of a storage subsystem). The virtual machine must have exclusive access to thestorage, so the storage must be set in an Offline state in Disk Management. The storage is not limited insize, so it can be a multiterabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following:
This type of disk cannot be dynamically expanded.
You cannot use differencing disks with them.
You cannot take virtual hard disk snapshots.
Att:
If you are installing an operating system on the physical disk and it is in an Online state before the virtualmachine is started, the virtual machine will fail to start.
You must store the virtual machine configuration file inan alternate location because the physical disk is used by the operating system installation. For example,locate the configuration file on another internal drive on the server running Hyper-V.
http://technet.microsoft.com/en-us/library/ee344823%28v=ws.10%29.aspx http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx

QUESTION 190
Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1.
You share a printer named Printer1 on Server1.
You need to configure Printer1 to meet the following requirements:
– Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.
– Prevent other users from sending print jobs to Printer1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Assign the Print permission to the Server Operators group
B.    Remove the permissions for the Creator Owner group.
C.    Remove the permissions for the Everyone group.
D.    Assign the Print permission to Group1.
E.    Assign the Print permission to the Administrators group.

Answer: CD
Explanation:
C: To prevent other users from sending print jobs to Printer1
D: To enable Group1 to send print jobs.
Note: The Server Operators group, the Administrators group, and the Print Operators group are all built-in and already have permissions to send print jobs.

GreatExam is one of the leading exam preparation material providers. We have a complete range of exams offered by the top vendors. You can download 70-410 dumps in PDF format on GreatExam.com. Comparing with others’, our 70-410 exam questions are more authoritative and complete. What’s more, the 70-410 prepare material are the latest. We ensure you pass the 70-410 exam easily.

http://www.greatexam.com/70-410-exam-questions.html