[Free] 2018(July) Dumps4cert Microsoft 70-410 Dumps with VCE and PDF Download 151-160

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!

Installing and Configuring Windows Server 2012

Question No: 151 – (Topic 2)

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table.

Dumps4Cert 2018 PDF and VCE

Server3 is configured to obtain an IP address automatically.

You need to prevent Server3 from receiving an IP address from Server1. What should you create on Server1?

  1. A reservation

  2. A filter

  3. A scope option

  4. An exclusion

Answer: B Explanation:

  1. For clients that require a constant IP address

  2. Filter to exclude MAC address of Server3

  3. Range of allowed IP’s to be assigned

  4. Exclude range of IP’s

MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out. For example, if you have set a DHCP server to exclude the address range then the only way a computer on your network would get an address of would be if you assigned it statically on that machine. This is because DHCP knows NOT to give this range of IP addresses out.

A reservation is a specific IP addresses that is tied to a certain device through its MAC address. For example, if we have a workstation on the network that requires a certain IP address, but we don’t want to go through to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of the NIC on the computer is AA-BB- 00FF-CC-AA and we want it to maintain the IP address of then we would

create a DHCP reservation under that particular scope saying that the IP address is reserved only for the MAC address AA-BB-00-FF-CC-AA.

Reference: http://technet.microsoft.com/en-us/magazine/ff521761.aspx

Question No: 152 – (Topic 2)

You have a server that runs a Server Core installation of Windows Server 2012 R2. You need to change the DNS server used by IPv6.

What should you do?

  1. From Sconfig, configure the Network Settings.

  2. Run the sc.exe command and specify the config parameter.

  3. From Windows PowerShell, run the Set-NetIpv6Protocol cmdlet.

  4. From Windows PowerShell, run the Set-DnsClientServerAddress cmdlet.

Answer: D Explanation:

The Set-DnsClientServerAddresscmdlet sets one or more IP addresses for DNS servers associated with an interface. This cmdlet statically adds DNS server addresses to the interface. If this cmdlet is used to add DNS servers to the interface, then the DNS servers will override any DHCP configuration for that interface.

PS C:\gt; Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses quot;;,quot;;)


http://technet.microsoft.com/en-us/library/jj592692.aspx http://technet.microsoft.com/en-us/library/jj590768.aspx

Question No: 153 HOTSPOT – (Topic 2)

Your network contains an Active Directory forest. The forest contains two domains named Domain1 and Domain2.

Domain1 contains a file server named Server1. Server1 has a shared folder named Share1.

Domain2 contains 50 users who require access to Share1.

You need to create groups in each domain to meet the following requirements:

->In Domain1, create a group named Group1. Group1 must be granted access to Share1.

->In Domain2, create a group named Group2. Group2 must contain the user

accounts of the 50 users.

->Permission to Share1 must only be assigned directly to Group1.

Which type of groups should you create and which group nesting strategy should you use? To answer, select the appropriate configuration in the answer area.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

Any group, whether it is a security group or a distribution group, is characterized by a scope that identifies the extent to which the group is applied in the domain tree or forest. The boundary, or reach, of a group scope is also determined by the domain functional level setting of the domain in which it resides. There are three group scopes:

universal, global, and domain local.

Security groups in a nesting strategy with global scope can have only accounts as their members. And Security groups with domain local scope can have other groups with global scope and accounts as their members.

Question No: 154 – (Topic 2)

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a workgroup.

You need to configure a local Group Policy on Server1 that will apply only to non- administrators.

Which tool should you use?

  1. Group Policy Object Editor

  2. Group Policy Management

  3. Group Policy Management Editor

  4. Server Manager

Answer: A Explanation:

Once you create a GPO, you can open it in the Group Policy Management Editor and configure the GPO’s policies, specifically those settings that target the non-administrators. In this scenario however, you still need to configure the Group Policy thus you would need the GPO Editor.


Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 10: Implementing Group Policy, Lesson 1: Planning, implementing and managing group policy, p. 475

Question No: 155 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the

Hyper-V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1.

You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?

  1. BIOS

  2. Network Adapter

  3. COM 1

  4. Processor

Answer: C Explanation:

Named pipe.

This option connects the virtual serial port to a Windows named pipe on the host operating system or a computer on the network. A named pipe is a portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer). For example, a local named pipe path could be

\\.\pipe\mypipename. Named pipes can be used to create a virtual null modem cable between two virtual machines, or between a virtual machine and a debugging program on the host operating system that supports the use of named pipes.

By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem cable connection. Named pipes are useful for debugging or for any program that requires a null modem connection.

Named pipes can be used to connect to a virtual machine by configuring COM 1. References:

http://support.microsoft.com/kb/819036 http://support.microsoft.com/kb/141709

Question No: 156 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2.

You plan to create a shared folder. The shared folder will have a quota limit.

You discover that when you run the New Share Wizard, you cannot select the SMB Share

– Advanced option.

You need to ensure that you can use SMB Share – Advanced to create the new share. What should you do on Server1 before you run the New Share Wizard?

  1. Configure the Advanced system settings.

  2. Run the Install-WindowsFeature cmdlet.

  3. Run the Set-SmbShare cmdlet.

  4. Install the Share and Storage Management tool.

Answer: B Explanation:

Install-WindowsFeature will install one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2.

Question No: 157 – (Topic 2)

You have a new server named Server1 that runs Windows Server 2012 R2. Server1 has two dual-core processors and 32 GB of RAM.

You install the Hyper-V server role on Server1.

You create two virtual machines on Server1 that each have 8 GB of memory.

You need to minimize the amount of time it takes for both virtual machines to access


What should you configure on each virtual machine?

  1. Resource control

  2. Memory weight

  3. Dynamic Memory

  4. NUMA topology

Answer: D Explanation:

Windows Server 2012 introduced support for projecting a virtual NUMA topology into Hyper-V virtual machines. This capability can help improve the performance of workloads running on virtual machines that are configured with large amounts of memory.

Question No: 158 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.

You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed.

You configure all of the client computers to use Server1 as their primary DNS server.

You need to prevent Server1 from attempting to resolve Internet host names for the client computers.

What should you do on Server1?

  1. Create a primary zone named “root”.

  2. Create a primary zone named quot;GlobalNamesquot;.

  3. Create a forwarder that points to

  4. Create a primary zone named “.”.

Answer: A

Question No: 159 – (Topic 2)

You plan to deploy a file server to a temporary location.

The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders.

You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs.

Which file system should you use?

  1. NFS

  2. FAT32

  3. ReFS

  4. NTFS

Answer: C Explanation:

The ReFS file system allows for resiliency against corruptions with the option to salvage amongst many other key features like Metadata integrity with checksums, Integrity streams with optional user data integrity, and shared storage pools across machines for additional failure tolerance and load balancing, etc.

Question No: 160 HOTSPOT – (Topic 2)

Your network contains an Active Directory domain named contoso.com.

You need to identify whether the Company attribute replicates to the global catalog.

Which part of the Active Directory partition should you view?

To answer, select the appropriate Active Directory object in the answer area.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

Schema -Contains the Schema container, which stores class and attribute definitions for all existing and possible Active Directory objects in cn=schema,cn=configuration,dc= forestRootDomain. Updates to this container are replicated to all domain controllers in the forest. You can view the contents of the Schema container in the Active Directory Schema console.

An Active Directory Lightweight Directory Services (AD LDS) schema defines, using object classes and attributes, the types of objects and data that can be created and stored in an AD LDS directory. The schema can be extended with new classes and attributes, either by administrators or by the applications themselves. In addition, unneeded schema classes and attributes can be deactivated.


http://technet.microsoft.com/en-us/library/cc771975.aspx http://technet.microsoft.com/en-us/library/cc731547.aspx

100% Dumps4cert Free Download!
Download Free Demo:70-410 Demo PDF
100% Dumps4cert Pass Guaranteed!
70-410 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

  • Categories

  • Tags

  • Hot Exams

  • Hot Exams

  • Hot Catageories

  • microsoft dumps

    62-193 Dumps
    70-243 Dumps
    70-246 Dumps
    70-247 Dumps
    70-331 Dumps
    70-332 Dumps
    70-333 Dumps
    70-334 Dumps
    70-339 Dumps
    70-341 Dumps
    70-342 Dumps
    70-345 Dumps
    70-346 Dumps
    70-347 Dumps
    70-348 Dumps
    70-354 Dumps
    70-355 Dumps
    70-357 Dumps
    70-383 Dumps
    70-384 Dumps
    70-385 Dumps
    70-398 Dumps
    70-410 Dumps
    70-411 Dumps
    70-412 Dumps
    70-413 Dumps
    70-414 Dumps
    70-417 Dumps
    70-461 Dumps
    70-462 Dumps
    70-463 Dumps
    70-464 Dumps
    70-465 Dumps
    70-466 Dumps
    70-467 Dumps
    70-469 Dumps
    70-470 Dumps
    70-473 Dumps
    70-475 Dumps
    70-480 Dumps
    70-481 Dumps
    70-482 Dumps
    70-483 Dumps
    70-484 Dumps
    70-485 Dumps
    70-486 Dumps
    70-487 Dumps
    70-488 Dumps
    70-489 Dumps
    70-490 Dumps
    70-491 Dumps
    70-492 Dumps
    70-494 Dumps
    70-496 Dumps
    70-497 Dumps
    70-498 Dumps
    70-499 Dumps
    70-517 Dumps
    70-532 Dumps
    70-533 Dumps
    70-534 Dumps
    70-535 Dumps
    70-537 Dumps
    70-640 Dumps
    70-642 Dumps
    70-646 Dumps
    70-673 Dumps
    70-680 Dumps
    70-681 Dumps
    70-682 Dumps
    70-684 Dumps
    70-685 Dumps
    70-686 Dumps
    70-687 Dumps
    70-688 Dumps
    70-689 Dumps
    70-692 Dumps
    70-694 Dumps
    70-695 Dumps
    70-696 Dumps
    70-697 Dumps
    70-698 Dumps
    70-703 Dumps
    70-705 Dumps
    70-713 Dumps
    70-734 Dumps
    70-735 Dumps
    70-740 Dumps
    70-741 Dumps
    70-742 Dumps
    70-743 Dumps
    70-744 Dumps
    70-745 Dumps
    70-761 Dumps
    70-762 Dumps
    70-764 Dumps
    70-765 Dumps
    70-767 Dumps
    70-768 Dumps
    70-773 Dumps
    70-774 Dumps
    70-775 Dumps
    70-776 Dumps
    70-778 Dumps
    70-779 Dumps
    70-980 Dumps
    70-981 Dumps
    70-982 Dumps
    74-343 Dumps
    74-344 Dumps
    74-409 Dumps
    74-678 Dumps
    74-697 Dumps
    77-418 Dumps
    77-419 Dumps
    77-420 Dumps
    77-421 Dumps
    77-422 Dumps
    77-423 Dumps
    77-424 Dumps
    77-425 Dumps
    77-426 Dumps
    77-427 Dumps
    77-428 Dumps
    77-600 Dumps
    77-601 Dumps
    77-602 Dumps
    77-603 Dumps
    77-604 Dumps
    77-605 Dumps
    77-725 Dumps
    77-726 Dumps
    77-727 Dumps
    77-728 Dumps
    77-729 Dumps
    77-730 Dumps
    77-731 Dumps
    77-853 Dumps
    77-881 Dumps
    77-882 Dumps
    77-883 Dumps
    77-884 Dumps
    77-885 Dumps
    77-886 Dumps
    77-887 Dumps
    77-888 Dumps
    77-891 Dumps
    98-349 Dumps
    98-361 Dumps
    98-362 Dumps
    98-363 Dumps
    98-364 Dumps
    98-365 Dumps
    98-366 Dumps
    98-367 Dumps
    98-368 Dumps
    98-369 Dumps
    98-372 Dumps
    98-373 Dumps
    98-374 Dumps
    98-375 Dumps
    98-379 Dumps
    98-380 Dumps
    98-381 Dumps
    98-382 Dumps
    98-383 Dumps
    98-388 Dumps
    AZ-100 Dumps
    AZ-101 Dumps
    AZ-102 Dumps
    INF-203x Dumps
    INF-204x Dumps
    INF-205x Dumps
    INF-206x Dumps
    MB2-700 Dumps
    MB2-701 Dumps
    MB2-702 Dumps
    MB2-703 Dumps
    MB2-704 Dumps
    MB2-706 Dumps
    MB2-707 Dumps
    MB2-708 Dumps
    MB2-709 Dumps
    MB2-710 Dumps
    MB2-711 Dumps
    MB2-712 Dumps
    MB2-713 Dumps
    MB2-714 Dumps
    MB2-715 Dumps
    MB2-716 Dumps
    MB2-717 Dumps
    MB2-718 Dumps
    MB2-719 Dumps
    MB2-877 Dumps
    MB5-705 Dumps
    MB6-700 Dumps
    MB6-701 Dumps
    MB6-702 Dumps
    MB6-703 Dumps
    MB6-704 Dumps
    MB6-705 Dumps
    MB6-884 Dumps
    MB6-885 Dumps
    MB6-886 Dumps
    MB6-889 Dumps
    MB6-890 Dumps
    MB6-892 Dumps
    MB6-893 Dumps
    MB6-894 Dumps
    MB6-895 Dumps
    MB6-896 Dumps
    MB6-897 Dumps
    MB6-898 Dumps