Installing and Configuring Windows Server 2012

Here you have the best Microsoft 70-410 practice exam questions

  • You have 51 total questions to study from
  • Each page has 5 questions, making a total of 11 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 13, 2024
Question 1 of 51

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

An iSCSI SAN is available on the network.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

You create a LUN on the SAN to host the virtual hard drive files for the virtual machines.

You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space.

Which type of virtual hard disk should you create on the LUN?

    Correct Answer: B

    To create a virtual hard disk that is 3 TB in size, it is best to use a VHDX file type, as VHD files have a size limit of 2 TB. Furthermore, using a fixed-size VHDX file ensures that the full 3 TB size is allocated upfront, which prevents the virtual machine from being paused due to insufficient space on the LUN. Dynamically expanding disks, while initially saving space, can run into issues if the underlying storage runs out of space, which would cause VM1 to pause. Therefore, a fixed-size VHDX is the most appropriate choice to avoid such interruptions.

Question 2 of 51

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012

R2 and has the Hyper-V server role installed.

Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1.

On VM5, you install a network monitoring application named Monitor1.

You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)

    Correct Answer: C, E

    To capture all inbound and outbound traffic to VM6 using the monitoring application on VM5, you need to enable port mirroring. Port mirroring involves designating one VM's network adapter as the source and another VM's network adapter as the destination for mirrored traffic. In this case, VM6 will be the source of the traffic and VM5 will be the destination. You will use 'Set-VMNetworkAdapter' cmdlet with 'PortMirroring Source' for VM6 and 'PortMirroring Destination' for VM5 to properly configure the traffic flow for monitoring. Therefore, the correct commands are 'Get-VM VM5 | Set-VMNetworkAdapter -PortMirroring Destination' and 'Get-VM VM6 | Set-VMNetworkAdapter -PortMirroring Source'.

Question 3 of 51

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in the following table.

You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1.

You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.

What should you do on Server1?

    Correct Answer: A

    To ensure that if a physical NIC fails on Server1, VM1 remains connected to the network, you should run the Set-VmNetworkAdapter cmdlet. This cmdlet allows you to configure network adapter settings for a virtual machine, which includes options for NIC teaming. By properly setting up NIC teaming, you can ensure redundancy so that the virtual machine remains connected even if one physical NIC fails. Additional settings or network adapters are not necessary for this configuration, and modifying the virtual switches themselves does not address the NIC teaming configuration required to achieve network redundancy.

Question 4 of 51

HOTSPOT -

You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit. (Click the Exhibit button.)

The Share permissions of Share1 are configured as shown in the Share Permissions exhibit. (Click the Exhibit button.)

You have a group named Group1. The members of Group1 are shown in the Group1 exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

Hot Area:

    Correct Answer:

    NTFS permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system. Share permissions control access to folders over a network. To access a file over a network, a user must have appropriate share permissions (and appropriate NTFS permissions if the shared folder is on an

    NTFS volume).Granting a user Full Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is restricted in some other way.User1 was not granted Full Control permission.

    The Administrators have Full Control permission. I assume that User2 is an administrator since the Group1 exhibit shows only User1 as a member.

    References: http://technet.microsoft.com/en-us/library/cc754178.aspx share access, p.75-80

Question 5 of 51

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain.

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.

What should you do on Core1?

    Correct Answer: D

    To ensure that you can use Event Viewer on Server1 to view the event logs on Core1, you need to enable the appropriate firewall rule. Running the 'Enable-Com + Network Access Firewall Rule' on Core1 allows remote event log management by permitting the necessary network traffic. This will allow Server1 to access the event logs on Core1.