[Free] 2019(Nov) EnsurePass Microsoft 70-410 Dumps with VCE and PDF 91-100

Get Full Version of the Exam

Question No.91

Your network contains an active directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a server core installation of windows server 2012. You need to uninstall Active Directory from DC5 manually. Which tool should you use?

  1. The Remove-WindowsFeature cmdlet

  2. the dsamain.exe command

  3. the ntdsutil.exe command

  4. the Remove-ADComputer cmdlet

Correct Answer: A


A. Removes Roles and Features to remove DC use Uninstall-addsdomaincontroller

B.Exposes Active Directory data that is stored in a snapshot or backup as a Lightweight Directory Access Protocol (LDAP) server

  1. Manually removes a domain controller

  2. Removes AD computer object http://technet.microsoft.com/en-us/library/ee662310.aspx http://support.microsoft.com/kb/216498 http://technet.microsoft.com/en-us/library/ee617250.aspx

Question No.92

You have a server named Server 2 that runs Windows Server 2012 R2. Server 2 has the Hyper-V server role installed.

The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button).

You create a virtual machine on Server2 named VM1. You need to ensure that you can configure a pass-through disk for VM1. What should you do?


  1. Convert Disk 1 to a MBR disk.

  2. Convert Disk 1 to a basic disk.

  3. Take Disk 1 offline.

  4. Create a partition on Disk 1.

Correct Answer: C


Pass-through Disk Configuration

Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper- v.aspx

Question No.93

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations:

  • 16GB of RAM

  • A single quad-core CPU

  • Three network teams that have two network adapters each

    You add additional CPUs and RAM to Server 1.

    You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should you run first?

    1. Set-NetAdapter.

    2. Add-Net1.bfoTeamNic

    3. Add-VMNetworkAdapter

    4. Remove-NetLbfoTeam

    Correct Answer: D


    1. Sets adapter properties

    2. Add new interface to NIC Team

    3. Adds vadapter to vm

    4. Removed NIC from host

    You need 4 virtual switches but currently only have 3 teams available. You would need to break a team first.

    http://technet.microsoft.com/en-us/library/jj130875(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj130850(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848564(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj130848(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj130848.aspx

    Question No.94

    Your network contains an Active Directory domain named contoso.com. The domain contains two servers that run Windows Server 2012 R2.

    You create a security template named template 1 by using the Security Templates snap-in. You need to apply Template1 to Server2.

    Which tool should you use?

    1. Authorization Manager

    2. Local Security Policy

    3. Certificate Templates

    4. System Configuration

    Correct Answer: B


    A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.

    Question No.95

    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Manged Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1?

    1. From a command prompt, run sc.exe and specify the config parameter.

    2. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter

    3. From Windows PowerShell,run Set-Service and specify the -StartupType parameter

    4. From Services Console configure the General settings

    Correct Answer: A

    Question No.96

    Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. On DC2, you open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the option to run the DHCP console. What should you do?


    1. On Server1, install the Feature Administration Tools.

    2. In the domain, add DC1 to the DHCP Administrators group.

    3. On DC2 and Server1, run winrm quickconfig.

    4. On DC2, install the Role Administration Tools.

    Correct Answer: D



    Question No.97

    Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer Configuration settings and User Configuration settings.

    You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. What should you configure?

    1. the Group Policy loopback processing mode

    2. the Block Inheritance feature

    3. the Enforced setting

    4. the GPO Status

    Correct Answer: D


    GP1 is linked to the domain, thus, it will apply to OU1 (where there are users and computers). You need GP1鈥檚 computer settings to apply, but not its user settings.

    1. The Group Policy loopback processing mode – If you use group policy loopback processing you have two choices: merge and replace. If you use merge the user settings will still apply to users, but with merge with user settings from other GPOs. If you instead choose replace, the user settings of GP1 will replace any user settings from another GPO that applies to users. Either way, the user settings of GP1 are still applying to users. Thus, A is incorrect.

    2. The Block Inheritance feature – If you block the inheritance of GP1, the user settings will not apply to the users, but it will also keep the computer settings from applying. Thus, B is incorrect.

    3. The Enforced setting – This will enforce the group policy of GP1 and keep it from being overruled by another group policy. Thus, C is incorrect.

    4. The GPO Status – You can disable the user settings, so that it is applying just computer settings. This meets the requirement of applying the computer settings still, but not applying the user settings of GP1 to users. Thus, D is correct.

    Question No.98

    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

    On Server1, you create a virtual machine named VM1. When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as shown in the following exhibit.


    You need to add the RemoteFX 3D Video Adapter to VM1. What should you do first?

    1. On Server1, run the Enable-VMRemoteFxPhysicalVideoAdapter cmdlet.

    2. On Server1, install the Media Foundation feature.

    3. On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet.

    4. On Server1, install the Remote Desktop Virtualization Host (RD Virtualization Host) role service.

    Correct Answer: D


    A. Enables one or more RemoteFX physical video adapters for use with RemoteFX-enabled virtual machines.


    1. Adds a RemoteFX video adapter in a virtual machine.

    2. Role must be added for host first

    TM is included as part of the Remote Desktop Virtualization Host role service, and it Microsoft?RemoteFX

    enables the delivery of a full Windows user experience to a range of client devices including rich clients, thin clients, and ultrathin clients. RemoteFX renders content by using graphics processing

    units (GPUs) that are present on the server and then shared across multiple virtual desktops. RemoteFX renders a range of content including DirectX and all types of multimedia, and it is optimized for LAN-based networks. The number of monitors and their maximum resolution determines the amount of GPU memory on the server required by RemoteFX. This consideration is important in determining the scale for how many virtual machines a Remote Desktop Virtualization Host server can support.

    http://technet.microsoft.com/en-us/library/hh848506(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848520(v=wps.620).aspx http://technet.microsoft.com/en-us/library/ff817586(v=ws.10).aspx

    Question No.99

    Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. You install the Network Load Balancing feature on VM1 and VM2. You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). Which virtual machine settings should you configure on VM1 and VM2?

    1. Router guard

    2. DHCP guard

    3. Port mirroring

    4. MAC address

    Correct Answer: D


    In Hyper-V, the VM host prevents dynamic MAC address updates as an extra layer of security in thedatacenter. This is because the VM may have full administrator rights, yet it may be untrusted in thedatacenter, for example when the VM hosting is provided by an independent hosting company. In this scenario,we need to make sure that one VM cannot cause a DOS or information disclosure attack against another VM. If a VM is able to spoof its MAC address, then it can spoof the MAC addresses of other VMs and impactother VMs on that host. The physical switches have similar protections and it is up to the admin to enable thatprotection or not. If you do not enable spoofing of MAC address prior to configuring NLB on the VM you could potentially haveproblems with the NLB cluster.

    When configuring NLB in unicast mode on Hyper-V with enable spoofing of MAC Address disabled you maysee some of the following symptoms:

    When initially configuring NLB you will lose network connectivity on the network adaptor NLB was configuredon.

    ?There will be an NLB error event in the Windows Event Log stating that the network adaptor does not supportdynamic MAC address updates.

    After rebooting the server, NLB will appear to be bound to the network adapter, but the cluster VIP will nothave been added to the network adaptor.

    ?The cluster MAC address will still be the original MAC address associated with the network adaptor prior toconfiguring NLB. Use CMDgt;ipconfig /all to view the MAC address.

    It should start with quot;02-BF-***quot;

    If you ignore all previous symptoms and manually add the VIP you could get an IP conflict if there are othernodes in the cluster that have the same VIP.

    With that said, to allow VM guests to run NLB you need to set the VM property for quot;Enable spoofing of MACAddressquot;.

    To enable spoofing of MAC Addresses open the Hyper-V management console. Make sure the VM is stoppedopen the properties of the VM. Select the Network Adaptor for the NLB VM and check the quot;Enable spoofing ofMAC Addressquot; and click OK. Then start the VM.

    Question No.100

    Your network contains a Windows Server 2012 R2 image named Server12.wim. Server12.wim

    contains the images shown in the following table.


    Server12.wim is located in C:\.

    You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Server Datacenter image. You want to achieve this goal by using the minimum amount of Administrative effort.

    Which command should you run first?

    1. dism.exe /mount-wim /wimfile:c:\Server12.wim /index:4 /mountdir:c:\mount

    2. imagex.exe /capture c: c:\Server12.wim quot;windows server 2012server datacenterquot;

    3. dism.exe /image: c:\Server12.wim /enable-feature /featurename: servermigration

    4. imagex.exe /apply c:\Server12.wim 4 c:\

    Correct Answer: A


    1. Mounts the image before making any chnages

    2. imagex /capture creates windows images .wim

    3. You need to mount the image first

    4. imagex /App1y App1ies image to drive

    The Deployment Image Servicing and Management (DISM) tool is a command-line tool that is used to modifyWindows?images. You can use DISM to enable or disable Windows features directly from the commandprompt, or by App1ying an answer file to the image. You can enable or disable Windows features offline on a WIM or VHD file, or online on a running operating system.

    You can also use the DISM image management command to list the image index numbers or to verify thearchitecture for the image that you are mounting.ex:

    Dism /Mount-Image /ImageFile:C:\test\images\install.wim /Name:quot;Base Windows Imagequot;


    By default, DISM is installed at C:\Program Files (x86)\Windows Kits\8.0\Assessment and Deployment Kit\Deployment Tools\

    http://technet.microsoft.com/en-us/library/hh824822.aspx http://technet.microsoft.com/en-us/library/hh825258.aspx http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx

    Get Full Version of the Exam
    70-410 Dumps
    70-410 VCE and PDF