New Updated Microsoft MCSA 70-410 Real Exam Questions and Answers Download 321-330

Ensurepass

QUESTION 321

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers in the ENSUREPASS.com domain, including domain controllers, have Windows Server 2012 R2 installed.

ENSUREPASS.com has a domain controller, named ENSUREPASS-DC01. You have been instructed to make sure that the Group Policy Administrative Templates are available centrally.

Which of the following actions should you take?

 

A.

You should consider copying the policies folder to the PolicyDefinitions folder in the ENSUREPASS.com

domain’s SYSVOL folder.

B.

You should consider copying the PolicyDefinitions folder to the policies folder in the ENSUREPASS.com

domain’s SYSVOL folder.

C.

You should consider copying the PolicyDefinitions folder to the policies folder in the ENSUREPASS.com

domain’s systemroot folder.

D.

You should consider copying the PolicyDefinitions folder to the policies folder in the ENSUREPASS.com

 

domain’s logonserver folder.

 

Correct Answer: B

Explanation:

PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory, they are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy Management Console in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additional source of ADMX files, and will report them accordingly when setting your policies.

By default, the folder is not created. Whether you are a single DC or several thousand, I would strongly recommend you create a Central Store and start using it for all your ADMX file storage. It really does work well.

The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain.

To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in the following location: \FQDNSYSVOLFQDNpolicies

Note: FQDN is a fully qualified domain name.

http://tigermatt.wordpress.com/tag/policydefinitions/

http://support.microsoft.com/kb/929841/en-us

http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/ http://support.microsoft.com/kb/2741591/en-us

 

 

QUESTION 322

Your network contains an Active Directory domain named contoso.com. The password policy for the domain is set to require a minimum password length of 10 characters. A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. You need to identify what forces the two users to have different password lengths.

Which tool should you use?

 

A.

Credential Manager

B.

Security Configuration Wizard (SCW)

C.

Group Policy Management

D.

Active Directory Administrative Center

 

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx

In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources.

 

70-410-demo-357

 

70-410-demo-358

QUESTION 323

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers in the ENSUREPASS.com domain, including domain controllers, have Windows Server 2012 R2 installed.

ENSUREPASS.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple virtual machines.

You have enabled the use of Single-root I/O virtualization.

Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.)

 

A.

It maximizes network throughput, while minimizing network latency.

B.

It maximizes network throughput, as well as network latency.

C.

It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.

D.

It prevents the virtual machine from accessing the network switch directly.

 

Correct Answer: AC

Explanation:

SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V

virtualizationstack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments.

http://msdn.microsoft.com/en-us/library/windows/hardware/hh440148%28v=vs.85%29.aspx

 

 

QUESTION 324

You work as a senior administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 R2 installed.

You are running a training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory Architecture (NUMA).

Which of the following is TRUE with regards to Non-Uniform Memory Architecture (NUMA)? (Choose two.)

A.

It is a computer architecture used in multiprocessor systems.

B.

It is a computer architecture used in single processor systems.

C.

It allows a processor to access local memory faster than it can access remote memory.

D.

It allows a processor to access remote memory faster than it can access local memory.

 

Correct Answer: AC

Explanation:

NUMA is a hardware design feature that divides CPUs and memory in a physical server into NUMA nodes. You get the best performance when a process uses memory and CPU from within the same NUMA node.

de is full, then it’ll get memory from

When a process requires more memory, but the current NUMA no

another NUMA node and that comes at a performance cost to that process, and possibly all other processes on that physical server.

And that’s why virtualization engineers need to be aware of this. In Hyper-V we have Dynamic Memory.

Non-Uniform Memory Access or Non-Uniform Memory Architecture (NUMA) is a computer memory design used in multiprocessors, where the memory access time depends on the memory location relative to a processor. Under ccNUMA, a processor can access its own local memory faster than non-local memory, that is, memory local to another processor or memory shared between processors. NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures.

http://en.wikipedia.org/wiki/Non-Uniform_Memory_Access

http://www.aidanfinn.com/?p=11945

 

 

QUESTION 325

Hotspot Question

You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not ave access to the Internet. All roles are removed completely from DHCP1. You mount a Windows Server 2012 R2 installation image to the C:Mount folder. You need to install the DHCP Server server role on DHCP1 by using Server Manager. Which folder should you specify as the alternate path for the source files?To answer, select the appropriate folder in the answer area.

 

70-410-demo-359

 

Correct Answer:

 

70-410-demo-360

 

 

QUESTION 326

You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard. You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Enterprise. You want to achieve this goal by using the minimum amount of administrative effort.

What should you perform?

 

A.

a clean installation of Windows Server 2012

B.

an offline servicing by using Dism

C.

an online servicing by using Dism

D.

an upgrade installation of Windows Server 2012

 

Correct Answer: C

Explanation:

ROD: windows server 2012 enterprise DOES NOT EXIST, maybe they meant data center?

http://technet.microsoft.com/en-us/library/hh825157.aspx

 

 

QUESTION 327

You have a server named Server1 that runs Windows Server 2012 R2. You need to enable access-based enumeration for a file share on Server1. Which tool should you use?

 

A.

File Server Resource Manager (FSRM)

B.

File Explorer

C.

Share and Storage Management

D.

Server Manager

 

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/dd772681(v=WS.10).aspx

Access-based enumeration displays only the files and folders that a user has permissions to access. It is a feature that was previously available as a downloadable package for the Windows ServerĀ® 2003 operating system (it was also included in Windows Server 2003 Service Pack 1). Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management.

 

70-410-demo-361

70-410-demo-362

 

 

QUESTION 328

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You plan to create a shared folder. The shared folder will have a quota limit. You discover that when you run the New Share Wizard, you cannot select the SMB Share – Advanced option. You need to ensure that you can use SMB Share – Advanced to create the new share. What should you do on Server1 before you run the New Share Wizard?

 

A.

Run the Set-SmbSharecmdlet.

B.

Install the File Server Resource Manager role service.

C.

Configure Dynamic Access Control and App1y a central access policy.

D.

Configure the Advanced system settings.

 

Correct Answer: B

Explanation:

 

70-410-demo-363

 

QUESTION 329

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec. You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec. What should you do?

 

A.

From a command prompt, run netsh set global autotuninglevel = restricted congestionprovider = ctcp.

B.

From Windows Firewall with Advanced Security, exempt ICMP from IPSec.

C.

From a command prompt, run netsh set global

autotuninglevelhighlyrestrictedcongestionprovider=none.

D.

From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile.

 

Correct Answer: B

Explanation:

 

70-410-demo-364

 

 

 

QUESTION 330

Hotspot Question

Your network contains an Active Directory domain. The domain contains a server named Server28. The computer account of Server 28 is located in an organizational unit (OU) named OU1. A Group Policy object (GPO) named Application Restriction Policy is linked to OU1. The settings of the GPO are configured as shown in the GPO Settings exhibit. (Click the Exhibit button.)

 

70-410-demo-365

 

The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit button.)

 

70-410-demo-366

 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

 

70-410-demo-367

 

Correct Answer:

 

70-410-demo-368

 

 

 

Instant Access to Download Latest Complete Collection of Microsoft MCSA 70-410 Real Exam

Try Microsoft MCSA 70-410 Free Demo