26 05 2014
Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(191-200)!
You have a new server named Server1 that runs Windows Server 2012 R2. Server1 has two dual-core processors and 32 GB of RAM. You install the Hyper-V server role on Server1. You create two virtual machines on Server1 that each have 8 GB of memory. You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine?
A. Resource control
B. Dynamic Memory
C. NUMA topology
D. Memory weight
* Dynamic Memory is a new Hyper-V feature that helps you use physical memory more efficiently. With Dynamic Memory, Hyper-V treats memory as a shared resource that can be reallocated automatically among running virtual machines. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in memory demand and values that you specify. Dynamic Memory is available for Hyper-V in Windows Server 2008 R2 Service Pack 1 (SP1).
* Dynamic Memory helps you use memory resources more efficiently. Before this feature was introduced, changing the amount of memory available to a virtual machine could be done only when the virtual machine was turned off. With Dynamic Memory, Hyper-V can provide a virtual machine with more or less memory dynamically in response to changes in the amount of memory required by the workloads or applications running in the virtual machine. As a result, Hyper-V can distribute memory more efficiently among the running virtual machines configured with Dynamic Memory. Depending on factors such as workload, this efficiency can make it possible to run more virtual machines at the same time on one physical computer.
Reference: Hyper-V Dynamic Memory Configuration Guide
Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008 R2 or Windows Server 2012 R2. All client computers run Windows 8. All computer accounts are located in an organizational unit (OU) named OU1. You create a Group Policy object (GPO) that contains several AppLocker rules. You link the GPO to OU1. You need to ensure that the AppLocker rules apply to all of the client computers. What should you configure in the GPO? To answer, select the appropriate service in the answer area.
Your network contains an Active Directory domain named contoso.com. Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012 R2. The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1.
Which settings should you configure?
To answer, select the appropriate settings in the answer area.
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Hyperv1 and a domain controller named DC1. Hyperv1 has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1. Users report that the time on their client computer is incorrect. You log on to DC1 and verify that the time services are configured correctly. You need to prevent time conflicts between the time provided by DC1 and other potential time sources. What should you configure?
To answer, select the appropriate object in the answer area.
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. the dism.exe command
B. the Add-WindowsFeature cmdlet
C. the imagex.exe command
D. the setup.exe command
E. the ocsetup.exe command
F. the Add-WindowsPackage cmdlet
G. the Install-Module cmdlet
H. the Install-RoleService cmdlet
Add-WindowsFeature -The Add-WindowsFeature cmdlet allows you to install specified roles, role services, and features on a computer that is running Windows Server 2008 R2.
Install-WindowsFeature -Installs one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2.
dism /online /get-features PS C:\> Install-WindowsFeature -Name Web-Server –
IncludeAllSubFeature -ComputerName Server1 -WhatIf
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You need to configure storage for a virtual machine to meet the following requirements:
– Support up to 3 TB of data on a single hard disk.
– Allocate disk space as needed.
– Use a portable storage format.
What should you configure?
A. A pass-through disk
B. A fixed-size VHD
C. A dynamically expanding VHD
D. A fixed-size VHDX
E. A dynamically expanding VHDX
Support for virtual hard disk storage capacity of up to 64 TB.
vhd max is 2TB
You have a virtual machine named VM1. You install Windows Server 2012 R2 on VM1. You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. Which tool should you use?
You can use DISM to:
Add, remove, and enumerate packages and drivers.
Enable or disable Windows features.
Apply changes based on the offline servicing section of an unattend.xml answer file.
Configure international settings.
Upgrade a Windows image to a different edition.
Prepare a Windows PE image.
Take advantage of better logging.
Service down-level operating systems like Windows Vista with SP1 and Windows Server 2008.
Service all platforms (32-bit, 64-bit, and Itanium).
Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
Make use of old Package Manager scripts.
Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU.
You need to ensure that GP1 does not apply to the members of a group named Managers.
What should you configure?
A. The Security settings of Employees
B. The WMI filter for GP1
C. The Block Inheritance option for Employees
D. The Security settings of GP1
A. Wrong Group
B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher sites, domains, or organizational units from being automatically inherited by the child-level. D. Set Managers to – Members of this security group are exempt from this Group Policy object.
Security settings.You use the Security Settings extension to set security options for computers and users within the scope of a Group Policy object. You can define local computer, domain, and network security settings.
Figure belows shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.
You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot?
A. Run the Stop-VM cmdlet.
B. Run the Convert-VHD cmdlet.
C. Decrease the Maximum RAM
D. Decrease the Minimum RAM.
What are virtual machine snapshots?
Virtual machine snapshots capture the state, data, and hardware configuration of a running virtual machine.
What are snapshots used for?
Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual machine snapshots are intended mainly for use in development and test environments. Having an easy way to revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can troubleshoot a problem.
There are certain circumstances in which it may make sense to use snapshots in a production environment. For example, you can use snapshots to provide a way to revert a potentially risky operation in a production environment, such as applying an update to the software running in the virtual machine.
How are snapshots stored?
Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify.
Reducing the available RAM for the VM would reduce the size of the snapshot,what better than have the machine turn off, not using any memory 😉
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?
A. From Windows Explorer, modify the properties of the volume that contains Share1.
B. From Server Manager, modify the properties of the volume that contains Share1.
C. From Server Manager, modify the properties of Share1.
D. From Windows Explorer, modify the properties of Share1.
Access based enumeration needs to be enabled: