web analytics
  • [May 2018] Microsoft Exam 70-765 PDF Dump Free Download In Lead2pass 155q

    Lead2pass 70-765 New Questions For Passing The 70-765 Certification Exam:

    https://www.lead2pass.com/70-765.html

    QUESTION 51
    You administer a Microsoft SQL Server 2012 database.
    The database contains a Product table created by using the following definition:

    511

    You need to ensure that the minimum amount of disk space is used to store the data in the Product table.
    What should you do?

    A.    Convert all indexes to Column Store indexes.
    B.    Implement Unicode Compression.
    C.    Implement row-level compression.
    D.    Implement page-level compression.

    Answer: D
    Explanation:
    Incorrect Answers:
    A: Only a single index is used.
    B: Unicode compression supports the fixed-length nchar(n) and nvarchar(n) data types.
    C: Row-level compression does not affect VARCHAR och CHAR columns.
    https://docs.microsoft.com/en-us/sql/relational-databases/data-compression/data-compression
    https://docs.microsoft.com/en-us/sql/relational-databases/data-compression/page-compression-implementation
    https://docs.microsoft.com/en-us/sql/relational-databases/data-compression/row-compression-implementation

    QUESTION 52
    You administer a Microsoft SQL Server 2012 instance.
    After a routine shutdown, the drive that contains tempdb fails.
    You need to be able to start the SQL Server.
    What should you do?

    A.    Modify tempdb location in startup parameters.
    B.    Start SQL Server in minimal configuration mode.
    C.    Start SQL Server in single-user mode.
    D.    Configure SQL Server to bypass Windows application logging.

    Answer: B
    Explanation:
    If you have configuration problems that prevent the server from starting, you can start an instance of Microsoft SQL Server by using the minimal configuration startup option.
    When you start an instance of SQL Server in minimal configuration mode, note the following:
    Only a single user can connect, and the CHECKPOINT process is not executed.
    Remote access and read-ahead are disabled.
    Startup stored procedures do not run.
    tempdb is configured at the smallest possible size.
    https://docs.microsoft.com/en-us/sql/database-engine/configure-windows/start-sql-server-with-minimal-configuration

    QUESTION 53
    You administer a single server that contains a Microsoft SQL Server 2012 default instance.
    You plan to install a new application that requires the deployment of a database on the server. The application login requires sysadmin permissions.
    You need to ensure that the application login is unable to access other production databases.
    What should you do?

    A.    Use the SQL Server default instance and configure an affinity mask.
    B.    Install a new named SQL Server instance on the server.
    C.    Use the SQL Server default instance and enable Contained Databases.
    D.    Install a new default SQL Server instance on the server.

    Answer: B
    Explanation:
    https://docs.microsoft.com/en-us/sql/sql-server/install/work-with-multiple-versions-and-instances-of-sql-server

    QUESTION 54
    You administer a Microsoft SQL Server 2012 Enterprise Edition server that uses 64 cores.
    You discover performance issues when large amounts of data are written to tables under heavy system load.
    You need to limit the number of cores that handle I/O.
    What should you configure?

    A.    Processor affinity
    B.    Lightweight pooling
    C.    Max worker threads
    D.    I/O affinity

    Answer: D
    Explanation:
    The affinity Input-Output (I/O) mask Server Configuration Option.
    To carry out multitasking, Microsoft Windows 2000 and Windows Server 2003 sometimes move process threads among different processors. Although efficient from an operating system point of view, this activity can reduce Microsoft SQL Server performance under heavy system loads, as each processor cache is repeatedly reloaded with data. Assigning processors to specific threads can improve performance under these conditions by eliminating processor reloads; such an association between a thread and a processor is called processor affinity.
    http://msdn.microsoft.com/en-us/library/ms189629.aspx

    QUESTION 55
    You administer a Microsoft SQL Server 2012 instance that contains a financial database hosted on a storage area network (SAN).
    The financial database has the following characteristics:

    – A data file of 2 terabytes is located on a dedicated LUN (drive D).
    – A transaction log of 10 GB is located on a dedicated LUN (drive E).
    – Drive D has 1 terabyte of free disk space.
    – Drive E has 5 GB of free disk space.

    The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours. Five percent of the existing data is modified each day.
    The Finance department loads large CSV files into a number of tables each business day at 11:15 hours and 15:15 hours by using the BCP or BULK INSERT commands. Each data load adds 3 GB of data to the database.
    These data load operations must occur in the minimum amount of time.
    A full database backup is performed every Sunday at 10:00 hours. Backup operations will be performed every two hours (11:00, 13:00, 15:00, and 17:00) during business hours.
    You need to ensure that your backup will continue if any invalid checksum is encountered.
    Which backup option should you use?

    A.    STANDBY
    B.    Differential
    C.    FULL
    D.    CHECKSUM
    E.    BULK_LOGGED
    F.    CONTINUE_AFTER_ERROR
    G.    SIMPLE
    H.    DBO_ONLY
    I.    COPY_ONLY
    J.    SKIP
    K.    RESTART
    L.    Transaction log
    M.    NO_CHECKSUM
    N.    NORECOVERY

    Answer: F
    Explanation:
    The CONTINUE_AFTER_ERROR option, of the Transact-SQL BACKUP command, instructs BACKUP to continue despite encountering errors such as invalid checksums or torn pages.
    https://docs.microsoft.com/en-us/sql/t-sql/statements/backup-transact-sql

    QUESTION 56
    You administer a Microsoft SQL Server 2012 instance that contains a financial database hosted on a storage area network (SAN).
    The financial database has the following characteristics:

    – A data file of 2 terabytes is located on a dedicated LUN (drive D).
    – A transaction log of 10 GB is located on a dedicated LUN (drive E).
    – Drive D has 1 terabyte of free disk space.
    – Drive E has 5 GB of free disk space.

    The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours. Five percent of the existing data is modified each day.
    The Finance department loads large CSV files into a number of tables each business day at 11:15 hours and 15:15 hours by using the BCP or BULK INSERT commands. Each data load adds 3 GB of data to the database.
    These data load operations must occur in the minimum amount of time.
    A full database backup is performed every Sunday at 10:00 hours. Backup operations will be performed every two hours (11:00, 13:00, 15:00, and 17:00) during business hours.
    On Wednesday at 10:00 hours, the development team requests you to refresh the database on a development server by using the most recent version.
    You need to perform a full database backup that will be restored on the development server.
    Which backup option should you use?

    A.    NORECOVERY
    B.    FULL
    C.    NO_CHECKSUM
    D.    CHECKSUM
    E.    Differential
    F.    BULK_LOGGED
    G.    STANDBY
    H.    RESTART
    I.    SKIP
    J.    Transaction log
    K.    DBO ONLY
    L.    COPY_ONLY
    M.    SIMPLE
    N.    CONTINUE AFTER ERROR

    Answer: L
    Explanation:
    COPY_ONLY specifies that the backup is a copy-only backup, which does not affect the normal sequence of backups. A copy-only backup is created independently of your regularly scheduled, conventional backups. A copy-only backup does not affect your overall backup and restore procedures for the database.
    https://docs.microsoft.com/en-us/sql/t-sql/statements/backup-transact-sql

    QUESTION 57
    You administer a Microsoft SQL Server 2012 instance that contains a financial database hosted on a storage area network (SAN).
    The financial database has the following characteristics:

    – A data file of 2 terabytes is located on a dedicated LUN (drive D).
    – A transaction log of 10 GB is located on a dedicated LUN (drive E).
    – Drive D has 1 terabyte of free disk space.
    – Drive E has 5 GB of free disk space.

    The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours. Five percent of the existing data is modified each day.
    The Finance department loads large CSV files into a number of tables each business day at 11:15 hours and 15:15 hours by using the BCP or BULK INSERT commands. Each data load adds 3 GB of data to the database.
    These data load operations must occur in the minimum amount of time.
    A full database backup is performed every Sunday at 10:00 hours. Backup operations will be performed every two hours (11:00, 13:00, 15:00, and 17:00) during business hours.
    You need to ensure that the minimum amount of data is lost.
    Which recovery model should the database use?

    A.    NORECOVERY
    B.    FULL
    C.    NO_CHECKSUM
    D.    CHECKSUM
    E.    Differential
    F.    BULK_LOGGED
    G.    STANDBY
    H.    RESTART
    I.    SKIP
    J.    Transaction log
    K.    DBO ONLY
    L.    COPY_ONLY
    M.    SIMPLE
    N.    CONTINUE AFTER ERROR

    Answer: B
    Explanation:
    The full recovery model requires log backups. No work is lost due to a lost or damaged data file. Can recover to a specific point in time, assuming that your backups are complete up to that point in time.
    Incorrect Answers:
    F: The bulk logged recovery model can recover to the end of any backup. Point-in-time recovery is not supported.
    M: The simple recovery model can recover only to the end of a backup.
    https://docs.microsoft.com/en-us/sql/relational-databases/backup-restore/recovery-models-sql-server

    QUESTION 58
    You administer a Microsoft SQL Server 2012 instance that contains a financial database hosted on a storage area network (SAN).
    The financial database has the following characteristics:

    – A data file of 2 terabytes is located on a dedicated LUN (drive D).
    – A transaction log of 10 GB is located on a dedicated LUN (drive E).
    – Drive D has 1 terabyte of free disk space.
    – Drive E has 5 GB of free disk space.

    The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours. Five percent of the existing data is modified each day.
    The Finance department loads large CSV files into a number of tables each business day at 11:15 hours and 15:15 hours by using the BCP or BULK INSERT commands. Each data load adds 3 GB of data to the database.
    These data load operations must occur in the minimum amount of time.
    A full database backup is performed every Sunday at 10:00 hours. Backup operations will be performed every two hours (11:00, 13:00, 15:00, and 17:00) during business hours.
    You need to ensure that the backup size is as small as possible.
    Which backup should you perform every two hours?

    A.    NORECOVERY
    B.    FULL
    C.    NO_CHECKSUM
    D.    CHECKSUM
    E.    Differential
    F.    BULK_LOGGED
    G.    STANDBY
    H.    RESTART
    I.    SKIP
    J.    Transaction log
    K.    DBO ONLY
    L.    COPY_ONLY
    M.    SIMPLE
    N.    CONTINUE AFTER ERROR

    Answer: J
    Explanation:
    Minimally, you must have created at least one full backup before you can create any log backups. After that, the transaction log can be backed up at any time unless the log is already being backed up.
    https://docs.microsoft.com/en-us/sql/relational-databases/backup-restore/transaction-log-backups-sql-server

    70-765 dumps full version (PDF&VCE): https://www.lead2pass.com/70-765.html

    Large amount of free 70-765 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDejczeWp0aURaSnM

    You may also need:

    70-761 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDU2RSQnhzX2pIZVE

    70-762 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDMW9NcjJrQXlsMGs

    70-764 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDUjBoM0pVQnlUTlU

    70-767 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDdTF0R0taLWgxSmc

    70-768 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDZ2pRQkV6Vnc4dHc

  • [May 2018] 70-764 Exam Questions Free Download From Lead2pass 332q

    Best Lead2pass Microsoft 70-764 PDF Dumps With New Update Exam Questions:

    https://www.lead2pass.com/70-764.html

    QUESTION 81
    You administer a Microsoft SQL Server 2016 database named Orders.
    Users report that during peak usage periods, certain operations are taking more time than expected.
    Your initial analysis suggests that blocking is the cause.
    You need to gather more data to be able to determine which processes are being blocked and to identify the root cause.
    What should you do?

    A.    Start a trace using SQL Server Profiler to catch the Lock: Deadlock event.
    B.    Use sp_configure to set the blocked process threshold. Start a trace using SQL Server Profiler to catch the Blocked Process Report event.
    C.    Schedule a SQL Agent job to run every 60 seconds and insert the results of executing the sys.dm_os_wait_stats DMV into a table.
    D.    Use System Monitor to catch the Lock Waits/sec event.

    (more…)

  • [May 2018] Lead2pass 2018 New 70-744 Exam PDF Ensure 70-744 Certification Exam Pass 100% 160q

    Lead2pass 2018 New 70-744 Exam PDF Ensure 70-744 Certification Exam Pass Successfully:

    https://www.lead2pass.com/70-744.html

    QUESTION 51
    The New-CIPolicy cmdlet creates a Code Integrity policy as an .xml file. If you do NOT supply either driver files or rules what will happen?

    A.    The cmdlet performs a system scan
    B.    An exception/warning is shown because either one is required
    C.    Nothing
    D.    The cmdlet searches the Code Integrity Audit log for drivers

    (more…)

  • [May 2018] Updated Lead2pass Microsoft 70-743 Braindump Free Download 237q

    100% Free Lead2pass 70-743 New Questions Download:

    https://www.lead2pass.com/70-743.html

    QUESTION 121
    You deploy two servers that run Windows Server 2016.
    You install the Failovers Clustering feature on both servers.
    You need to create a workgroup cluster.
    What should you do?

    A.    Create matching local administrative accounts on both of the servers. Assign the same primary DNS suffix to both of the servers. Run the New-Cluster cmdlet and specify an administrative access point of None.
    B.    Configure both of the server to be in a workgroup named Workgroup. Configure the Cluster Service to log on as Network Service. Run the New-Cluster cmdlet and specify an administrative access point of DNS.
    C.    Create matching local administrative accounts on both of the servers. Assign the same primary DNS suffix to both of the servers. Run the New-Cluster cmdlet and specify an administrative access point of DNS.
    D.    Configure both of the server to be in a workgroup named Workgroup. Configure the Cluster Service to log on as Network Service. Run the New-Cluster cmdlet and specify an administrative access point of None. (more…)

  • [May 2018] 70-741 Latest Dumps Free Download From Lead2pass 180q

    New Lead2pass 70-741 Dumps PDF Version Released For Free Downloading:

    https://www.lead2pass.com/70-741.html

    QUESTION 41
    If you chose the Group Policy based provisioning method for IPAM, you must also provide a GPO name prefix in the provisioning wizard. After providing a GPO name prefix, the wizard will display the GPO names that must be created in domains that will be managed by IPAM.
    How many GPO’s are created from the following PowerShell command?

    Invoke-IpamGpoProvisioning -Domain contoso.com -GpoPrefixName IPAM1-DelegatedGpoUser user1 -IpamServerFqdn ipam1.contoso.com

    A.    1
    B.    3
    C.    2
    D.    4

    Answer: B
    Explanation:
    This example creates three GPOs (IPAM1_DHCP, IPAM1_DNS, IPAM1_DC_NPS) and links them to the contoso.com domain. These GPOs enable access for the server ipam1.contoso.com using the domain administrator account user1. Note: In this example, the hostname of the IPAM server is used as a GPO prefix, however this is not required.

    QUESTION 42
    Complete the missing term:
    The SLB ______ processes inbound network traffic and maps VIPs to DIPs, then forwards the traffic to the correct DIP.

    A.    Host Agent
    B.    Northbound API
    C.    SCVMM
    D.    MUX

    Answer: D
    Explanation:
    The SLB MUX processes inbound network traffic and maps VIPs to DIPs, then forwards the traffic to the correct DIP. Each MUX also uses BGP to publish VIP routes to edge routers. BGP Keep Alive notifies MUXes when a MUX fails, which allows active MUXes to redistribute the load in case of a MUX failure – essentially providing load balancing for the load balancers.

    QUESTION 43
    Which of the following is NOT a recognized private IP address ranges are specified by Internet Request for Comments (RFC) 1918?

    A.    10.0.0.0 – 10.255.255.255
    B.    192.168.0.0 – 192.168.255.255
    C.    172.16.0.0 – 172.31.255.255
    D.    128.24.0.0 – 128.24.255.255

    Answer: D

    QUESTION 44
    Because the network ID bits must always be chosen in a contiguous fashion from the high order bits, a shorthand way of expressing a subnet mask is to denote the number of bits that define the network ID as a network prefix using the network prefix notation: /<# of bits>.
    What is the Network Prefix for Class B?

    A.    /8
    B.    /64
    C.    /24
    D.    /16

    Answer: D

    QUESTION 45
    This question is regarding DNS Logging and Diagnosis.
    Which event is logged for a Recursive query timeout?

    A.    analytic event
    B.    audit event

    Answer: A

    QUESTION 46
    Software Defined Networking (SDN) provides a method to centrally configure and manage physical and virtual network devices such as routers, switches, and gateways in your datacenter. Virtual network elements such as Hyper-V Virtual Switch, Hyper-V Network Virtualization, and RAS Gateway are designed to be integral elements of your SDN infrastructure.
    Software defined networking provides which of the following capabilities?

    A.    The ability to abstract your applications and workloads from the underlying physical network, which is accomplished by virtualizing the network.
    B.    The ability to implement network policies in a consistent manner at scale, even as you deploy new workloads or move workloads across virtual or physical networks.
    C.    The ability to centrally define and control policies that govern both physical and virtual networks, including traffic flow between these two network types.
    D.    All of these

    Answer: D

    QUESTION 47
    With client reservations, you can reserve an IP address for permanent use by a DHCP client.
    Typically, you will need to do this if the client uses an IP address that was assigned using another method for TCP/IP configuration.
    If you are reserving an IP address for a new client, or an address that is different from its current one, you should verify that the address has not already been leased by the DHCP server. Reserving an IP address in a scope does not automatically force a client currently using that address to stop using it.
    Which ipconfig command would you use if the address is already in use?

    A.    ipconfig /flushdns
    B.    ipconfig /release
    C.    ipconfig /registerdns
    D.    ipconfig /renew

    Answer: B
    Explanation:
    If the address is already in use, the client using the address must first release it by issuing a DHCP release message (DHCPRELEASE).
    You can do this by typing ipconfig /release at the command prompt of a client computer running Windows XP or Windows Vista.
    Reserving an IP address at the DHCP server also does not force the new client for which the reservation is made to immediately move to that address. In this case, too, the client must first issue a DHCP request message (DHCPREQUEST). You can do this by typing ipconfig /renew at the command prompt of a client computer.

    QUESTION 48
    The DNS Server service provides several types of zones. Which zone helps to keep delegated zone information current, improve name resolution and simplify DNS administration, but is not an alternative for enhancing redundancy and load sharing?

    A.    secondary
    B.    stub
    C.    none of these
    D.    primary

    Answer: B
    Explanation:
    When a zone that this DNS server hosts is a stub zone, this DNS server is a source only for information about the authoritative name servers for this zone. The zone at this server must be obtained from another DNS server that hosts the zone. This DNS server must have network access to the remote DNS server to copy the authoritative name server information about the zone.
    When a DNS server loads a stub zone, such as widgets.thetoycompany.com, it queries the master servers, which can be in different locations, for the necessary resource records of the authoritative servers for the zone widgets.thetoycompany.com. The list of master servers may contain a single server or multiple servers, and it can be changed anytime.

    QUESTION 49
    The following example displays DNS query results that are performed from a DNS client computer using the Resolve-DnsName cmdlet.

    resolve-dnsname -name finance.secure.contoso.com -type A -server dns1.contoso.com

    You want to include the DO bit in a DNS query, to make the client is DNSSEC-aware, so that it is OK for the DNS server to return DNSSEC data in a response.
    What extra parameter should you use?

    A.    DnssecCd
    B.    DnssecOk
    C.    LlmnrOnly
    D.    DnsOnly

    Answer: B
    Explanation:
    When DO=1, the client indicates that it is able to receive DNSSEC data if available. Because the secure.contoso.com zone is signed, an RRSIG resource record was included with the DNS response when DO=1.

    QUESTION 50
    Which mode is being described below?
    Deploy the RAS Gateway as an edge VPN server, an edge DirectAccess server, or both simultaneously.
    In this configuration, RAS Gateway provides remote employees with connectivity to your network by using either VPN or DirectAccess connections.

    A.    Multitenant mode
    B.    Single tenant mode

    Answer: B

    70-741 dumps full version (PDF&VCE): https://www.lead2pass.com/70-741.html

    Large amount of free 70-741 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDb05IRmRaei1JLVE

    You may also need:

    70-740 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDMXFQVl9VSWx5WGs

    70-742 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDRWlFSW1vN0JwT3M

    70-743 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDdjVzVlJxOXB5TTg

    70-744 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDVExYaWZyTWt4OGc

  • [May 2018] Free Version Lead2pass Microsoft 70-740 PDF Dumps With Exam Questions Download 212q

    Lead2pass 100% Valid 70-740 Exam Questions PDF Free Download:

    https://www.lead2pass.com/70-740.html

    QUESTION 41
    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, white others might not have a correct solution.

    Your network contains an Active Directory forest.
    You install Windows Server 2016 on 10 virtual machines.
    You need to deploy the Web Server (IIS) server role identically to the virtual machines.
    Solution: From a Group policy object (GPO), you create an application control policy, and then you apply the policy to the virtual machines.
    Does this meet the goal?

    A.    Yes
    B.    No

    Answer: B
    Explanation:
    An application control policy is used to allow/disallow certain programs from running on a client, not for configuring roles.

    QUESTION 42
    You have a server named Server 1 thai runs Windows Server 2016.
    Server 1 has Internet connectivity. You have a Nano Server image.
    You need to download and save a Nano Server package in the Nano Server image.
    The package is NOT included in the Windows Server 2016 installation media.
    Which two cmdlets should you run on Server1?

    A.    Set-PaekageSource
    B.    Install-PackageProvider
    C.    Add-AppxProvisioncdPackage
    D.    Save-NanoServer
    E.    Package Add WindowsPackage

    Answer: BD

    QUESTION 43
    You have four servers named Server 1, Server2, Server3 and Server4 that run Windows Server 2016. Each server has a single 4-TB SATA hard disk.
    To each server, you attach a new 4 TB SATA hard disk.
    You need to create a new storage cluster that uses Storage Spaces Direct.
    The storage pool must contain all of the new disks.
    Which command should you run before you enable Storage Space Direct?

    A.    Add-ClusterSharedVolume -Name “Disk 1” -Cluster Cluster 1
    B.    New-Cluster -Name Clusterl -Node ‘Server1’, Server2, Server3 , Server4 -NoStorage
    C.    Get-ClusterAvailableDisk -Cluster Clusterl | Add-ClusterDisk
    D.    New-ClustcrStorageEnclosure -id 1 -name Cluster 1 -type jbod -ConnectionString Serverl,Server2.Server3,Server4

    Answer: B
    Explanation:
    Before enabling StorageSpacesDirect, you must create a new cluster using the New-Cluster command.

    QUESTION 44
    Note: This question is part of a series of questions that use the same similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

    You have a Hyper-V host named Server1 that runs Windows Server 2016. Server1 has a virtual machine named VM1 that uses a single VHDX file.
    VM1 is configured shown in the following table.

    441

    You plan to use VM1 as a virtual Machine Template to deploy shielded virtual machines.
    You need to ensure that VM1 can be used to deploy shielded virtual machines.
    What should you run?

    A.    the Mount-VHD cmdlet
    B.    the Diskpart command
    C.    the Set-VHD cmdlet
    D.    the Set-VM cmdlet
    E.    the Set-VMHost cmdlet
    F.    the Set-VMProcessor cmdlet
    G.    the Install-WindowsFeature cmdlet
    H.    the Optimize-VHD cmdlet

    Answer: B

    QUESTION 45
    In this section, you’ll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
    Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

    Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.
    On Server1, you have the following zone configuration

    451

    You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients.
    Solution From a Group Policy object (GPO) in tne domain, you modify the Network List Manager Policies.
    Does this meet the goal?

    A.    Yes
    B.    No

    Answer: B

    QUESTION 46
    In this section, you’ll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
    Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

    Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.
    On Server1, you have the following zone configuration.

    461

    You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients.
    Solution From Windows PowerShell on Setver1, you run the Add-DnsServerTrustAnchor cmdtel.
    Does this meet the goal?

    A.    Yes
    B.    No

    Answer: A

    QUESTION 47
    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, white others might not have a correct solution.

    You have a server named Server1 that runs Windows Server 2016. Server1 hosts a line-of- business application named App1.
    App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory.
    You need to log an event in the Application event log whenever App1 consume more than 4 GB of memory.
    Solution: You create a performance counter data collector.
    Does this meet the goal?

    A.    Yes
    B.    No

    Answer: B
    Explanation:
    To log a memory event based on a data collector, you will use the trace type of collector.
    Counter type is used to record data for a period of time.

    QUESTION 48
    You have an Active Director domain named Contoso.com. The domain contains servers named Server 1, Server2 and Server3 that run Windows Server 2016.
    Server1 and Server2 are nodes in a Hyper V cluster named Cluster1.
    You add a Hyper V Replica Broker role named Broker 1 to Cluster 1.
    Server3 is a Hyper-V server. A virtual machine named VM1 runs on Server3.
    Live Migration is enabled on all three servers and it is configured to use Kerberos authentication only.
    You need to ensure that you can perform the migration of VM1 to Server2.
    What should you do?

    A.    Modify the Storage Migration settings on Server3
    B.    Modify the Cluster Permissions for Cluster1.
    C.    Add the Server3 computer account to the Replicator group on Server1 and Server2.
    D.    Modify the Delegation settings for the Server3 computer account.

    Answer: D

    70-740 dumps full version (PDF&VCE): https://www.lead2pass.com/70-740.html

    Large amount of free 70-740 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDMXFQVl9VSWx5WGs

    You may also need:

    70-741 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDb05IRmRaei1JLVE

    70-742 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDRWlFSW1vN0JwT3M

    70-743 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDdjVzVlJxOXB5TTg

    70-744 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDVExYaWZyTWt4OGc

  • [May 2018] Free Lead2pass 70-735 PDF Download 100% Pass Exam 70-735 70q

    Free Lead2pass Microsoft 70-735 PDF Dumps With New Update Exam Questions:

    https://www.lead2pass.com/70-735.html

    QUESTION 41
    You have a computer named Computer1.
    You deploy an image of Windows 10 to Computer1.
    You start Computer1 in audit mode, and then you install several device drivers.
    You need to capture an image of Computer1.
    Which tool should you use?

    A.    Windows System Image Manager (Windows SIM)
    B.    dism.exe
    C.    Express Deployment Tool (EDT) for Windows 10
    D.    scanstate.exe (more…)

  • [May 2018] Lead2pass Dumps For Exam 70-698 With New Updated Exam Questions 120q

    Easily Pass 70-698 Exam By Training Lead2pass Latest VCE Dumps:

    https://www.lead2pass.com/70-698.html

    QUESTION 41
    Hotspot Question
    Your network contains a single Active Directory domain named contoso.com. In contoso.com, you create an organizational unit (OU) named 0U1.
    You need to use a provisioning package to perform the following:

    – Configure the computer names as”;Statio”;, followed by a random three-digit number.
    – Join the computers to contoso.com, and then create an account for the computers in 0U1.

    How should you configure the provisioning package? To answer, select the appropriate options in the answer area. (more…)

  • [May 2018] Easily Pass 70-697 Exam With Lead2pass Updated Microsoft 70-697 Dumps 308q

    Easily Pass Microsoft 70-697 Exam With Lead2pass Latest Microsoft 70-697 Brain Dumps:

    https://www.lead2pass.com/70-697.html

    QUESTION 31
    You are an IT consultant for small and mid-sized business.
    One of your clients wants to start using Virtual Smart Cards on its Windows 10 Enterprise laptops and tablets. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards.
    You need to verify that the client laptops and tablets support Virtual Smart Cards.
    What should you do?

    A.    Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.
    B.    Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.
    C.    Ensure that each laptop and tablet can read a physical smart card.
    D.    Ensure that the laptops and tablets are running Windows 10 Enterprise edition.

    Answer: A
    Explanation:
    A Trusted Platform Module (TPM) chip of version 1.2 or greater is required to support Virtual Smart Cards.
    Virtual smart card technology from Microsoft offers comparable security benefits to physical smart cards by using two-factor authentication. Virtual smart cards emulate the functionality of physical smart cards, but they use the Trusted Platform Module (TPM) chip that is available on computers in many organizations, rather than requiring the use of a separate physical smart card and reader. Virtual smart cards are created in the TPM, where the keys that are used for authentication are stored in cryptographically secured hardware.
    Incorrect Answers:
    B: BitLocker Drive Encryption does not need to be enabled on a system drive of the laptops and tablets to support Virtual Smart Cards.
    C: The ability to read a physical smart card does not ensure support for Virtual Smart Cards.
    D: Windows 10 Enterprise edition is not a requirement for Virtual Smart Cards; other versions of Windows 10 (and Windows 8) can use Virtual Smart Cards.
    https://technet.microsoft.com/en-GB/library/dn593708.aspx

    QUESTION 32
    Your network contains an Active Directory domain named contoso.com. Contoso.com is synchronized to a Microsoft Azure Active Directory.
    You have a Microsoft Intune subscription.
    Your company plans to implement a Bring Your Own Device (BYOD) policy.
    You will provide users with access to corporate data from their personal iOS devices.
    You need to ensure that you can manage the personal iOS devices.
    What should you do first?

    A.    Install the Company Portal app from the Apple App Store.
    B.    Create a device enrollment manager account.
    C.    Set a DNS alias for the enrollment server address.
    D.    Configure the Intune Service to Service Connector for Hosted Exchange.
    E.    Enroll for an Apple Push Notification (APN) certificate.

    Answer: E
    Explanation:
    An Apple Push Notification service (APNs) certificate must first be imported from Apple so that you can manage iOS devices. The certificate allows Intune to manage iOS devices and institutes an accredited and encrypted IP connection with the mobile device management authority services.
    Incorrect Answers:
    A: Users can only install the Company Portal app after they have been added as Intune users, which require the Apple Push Notification (APN) certificate to be in place.
    B: The device enrollment manager account is a special Intune account that has permission to enroll more than five corporate-owned devices. It is not used for BYOD.
    C: The Set a DNS alias for the enrollment server address setting is an optional setting for enrolling Windows devices.
    D: The Configure Intune service to service connector for hosted Exchange setting is used to connect Microsoft Intune and hosted Exchange without an on-premises infrastructure.
    https://technet.microsoft.com/library/dn408185.aspx
    https://technet.microsoft.com/en-us/library/dn764961.aspx
    https://technet.microsoft.com/en-us/library/mt346003.aspx
    https://technet.microsoft.com/en-us/library/dn646988.aspx

    QUESTION 33
    You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise.
    You notice that there are 25 mandatory updates listed in the Intune administration console.
    You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates.
    Which policy template should you use?

    A.    Microsoft Intune Agent Settings
    B.    Windows Configuration Policy
    C.    Microsoft Intune Center Settings
    D.    Windows Custom Policy (Windows 10 and Windows 10 Mobile)

    Answer: A
    Explanation:
    To configure the Prompt user to restart Windows during Intune client agent mandatory updates update policy setting you have to configure the Microsoft Intune Agent Settings policy. Setting the Prompt user to restart Windows during Intune client agent mandatory updates setting to No would prevent users from receiving prompts to restart Windows following the installation of mandatory updates.
    Incorrect Answers:
    B: You make use of the Microsoft Intune Windows general configuration policy to configure settings for enrolled devices, but not the policy setting in question.
    C: The Microsoft Intune Center allows users to get applications from the company portal, check for updates, manage Microsoft Intune Endpoint Protection, and request remote assistance. It does not allow users to configure settings to prevent users from receiving prompts to restart Windows following the installation of mandatory updates
    D: You can make use of the Microsoft Intune custom configuration policy for Windows 10 and Windows 10 Mobile to deploy OMA-URI (Open Mobile Alliance Uniform Resource Identifier) settings.
    http://blogs.technet.com/b/windowsintune/archive/2013/01/09/policy-settings-for-mandatory-updates.aspx https://technet.microsoft.com/en-us/library/dn646989.aspx

    QUESTION 34
    Drag and Drop Question
    You manage Microsoft Intune for a company named Contoso.
    You have 200 computers that run Windows 10. The computers are Intune clients.
    You need to configure software updates for the clients.
    Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

    341

    Answer:

    342

    Explanation:
    You must make use of the Microsoft Intune Windows general configuration policy to configure settings for enrolled devices. The system settings that can be configured using this policy include the following:
    – Require automatic updates.
    – Require automatic updates – Minimum classification of updates to install automatically.
    – User Account Control.
    – Allow diagnostic data submission.

    To configure the Allow immediate installation of updates that do not interrupt Windows update policy setting you have to configure and deploy a Microsoft Intune Agent Settings policy.
    Incorrect Answers:
    You can make use of the Microsoft Intune custom configuration policy for Windows 10 and Windows 10 Mobile to deploy OMA-URI (Open Mobile Alliance Uniform Resource Identifier) settings, which can be used to control features on Windows 10 and Windows 10 Mobile devices.
    https://technet.microsoft.com/en-us/library/dn646968.aspx
    https://technet.microsoft.com/en-us/library/mt147409.aspx

    QUESTION 35
    You have an Active Directory domain named contoso.com that contains a deployment of Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1).
    You have a Microsoft Intune subscription that is synchronized to contoso.com by using the Microsoft Azure Active Directory Synchronization Tool (DirSync.)
    You need to ensure that you can use Configuration Manager to manage the devices that are registered to your Microsoft Intune subscription.
    Which two actions should you perform? Each correct answer presents a part of the solution.

    A.    In Microsoft Intune, create a new device enrollment manager account.
    B.    Install and configure Azure Active Directory Synchronization Services (AAD Sync.)
    C.    In Microsoft Intune, configure an Exchange Connector.
    D.    In Configuration Manager, configure the Microsoft Intune Connector role.
    E.    In Configuration Manager, create the Microsoft Intune subscription.

    Answer: DE
    Explanation:
    To allow Configuration Manager to manage mobile devices in the same context as other devices, it requires you to create a Windows Intune subscription and synchronize user accounts from Active Directory to Microsoft Online. to achieve that, you are required to complete the following tasks:
    Sign up for a Windows Intune organizational account
    Add a public company domain and CNAME DNS entry
    Verify users have public domain User Principal Names (UPNs)
    If you plan to use single sign-on, deploy and configure Active Directory Federated Services
    (ADFS)
    Deploy and Configure Active Directory Synchronization
    Reset users Microsoft Online password – If not using ADFS*
    Configure Configuration Manager for mobile device management
    Create the Windows Intune Subscription in the Configuration Manager console
    Add the Windows Intune Connector Site System role
    Verify that Configuration Manager successfully connects to Windows Intune

    http://blogs.technet.com/b/configmgrteam/archive/2013/03/20/configuring-configuration-manager-sp1-to-manage-mobile-devices-using-windows-intune.aspx

    QUESTION 36
    You purchase a new Windows 10 Enterprise desktop computer. You have four external USB hard drives.
    You want to create a single volume by using the four USB drives.
    You want the volume to be expandable, portable and resilient in the event of failure of an individual USB hard drive.
    You need to create the required volume.
    What should you do?

    A.    From Control Panel, create a new Storage Space across 4 USB hard drives.
    Set resiliency type to Three-way mirror.
    B.    From Control Panel, create a new Storage Space across 4 USB hard drives.
    Set resiliency type to Parity.
    C.    From Disk Management, create a new spanned volume.
    D.    From Disk Management, create a new striped volume.

    Answer: B
    Explanation:
    Storage Spaces can combine multiple hard drives into a single virtual drive. To create a storage space, you’ll have to connect two or more additional internal or external drives to your computer to create a storage pool. You can also specify an arbitrarily large logical size. When your existing drive begins to fill up and nears the physical limit, Windows will display a notification in the Action Center, prompting you to add additional physical storage space. Selecting the Parity resiliency type allows Windows to store parity information with the data, thereby protecting you from a single drive failure.
    Incorrect Answers:
    A: The Three-way mirror resiliency type allows Windows to store three copies of your data. Mirroring uses drive space less efficiently than parity.
    C: Spanned volumes are not fault tolerant
    D: Striped volumes are not fault tolerant
    http://www.howtogeek.com/109380/how-to-use-windows-8s-storage-spaces-to-mirror-combine-drives/ https://technet.microsoft.com/en-us/library/cc772180.aspx
    https://technet.microsoft.com/en-us/library/cc732422.aspx

    QUESTION 37
    Drag and Drop Question
    You have a Windows 10 Enterprise computer.
    You have a 1-terabyte external hard drive.
    You purchase a second 1-terabyte external hard drive.
    You need to create a fault-tolerant volume that includes both external hard drives.
    You also need to ensure that additional external hard drives can be added to the volume.
    Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    371

    Answer:

    372

    Explanation:
    Storage Spaces can combine multiple hard drives into a single virtual drive. To create a storage space, you’ll have to connect two or more additional internal or external drives to your computer to create a storage pool. When creating the pool, any existing data on the disks will be lost. It is therefore important to back up the data if you do not want to lose it. You can also specify an arbitrarily large logical size. When your existing drive begins to fill up and nears the physical limit, Windows will display a notification in the Action Center, prompting you to add additional physical storage space. Selecting the Two-way mirror resiliency type allows Windows to store two copies of your data, so that you won’t lose your data if one of your drives fails.
    http://www.howtogeek.com/109380/how-to-use-windows-8s-storage-spaces-to-mirror-combine-drives/

    QUESTION 38
    Hotspot Question
    You manage 50 computers that run Windows 10 Enterprise.
    You have a Windows To Go workspace installed on a USB drive named USB1.
    You need to configure USB1 to meet the following requirements:

    – When you run Windows To Go from USB1, you can see the contents of the computer’s internal drives from File Explorer.
    – When you connect USB1 to a computer that runs Windows 10, you can automatically view the content of USB1 from File Explorer.

    In the table below, select the action that must be performed to achieve each requirement.
    NOTE: Make only one selection in each column. Each correct selection is worth one point.

    381

    Answer:

    382

    Explanation:
    If you want to view the contents of the computer’s internal drives from File Explorer when you run Windows To Go from USB1, you have to launch an elevated command prompt, run diskpart and then execute the List disk command. You now have to select the internal disk using the sel disk command, and then enter the online disk command.
    Configuring the attributes volume option from DiskPart allows you to display, set, or clear the attributes of a volume.
    Incorrect Answers:
    Configuring the attributes disk option from DiskPart allows you to display, set, or clear the attributes of a disk.
    Fsutil volume is used to dismount a volume, query to see how much free space is available on a disk, or find a file that is using a specified cluster.
    Fsutil behavior is used to query or set NTFS volume behaviour.
    http://www.verboon.info/2012/12/how-to-access-data-from-the-local-disk-when-running-a-windows-to-go-workspace/
    https://technet.microsoft.com/en-us/library/cc732970.aspx
    https://technet.microsoft.com/en-us/library/cc753059.aspx

    QUESTION 39
    You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles.
    A user reports that she has lost all of her personal data after a computer restart.
    You need to configure the user’s computer to prevent possible user data loss in the future.
    What should you do?

    A.    Remove the .man extension from the user profile name.
    B.    Configure Folder Redirection by using the domain group policy.
    C.    Configure the user’s documents library to include folders from network shares.
    D.    Add the .dat extension to the user profile name.

    Answer: B
    Explanation:
    Folder Redirection allows administrators to redirect the path of a folder to a new location, which can be a folder on the local computer or a directory on a network file share. Users can then work with documents on a server as if the documents were based on a local drive, but are available to the user from any computer on the network. Folder Redirection can be found under Windows Settings in the console tree by editing domain-based Group Policy via the Group Policy Management Console (GPMC).
    Incorrect Answers:
    A: A super mandatory profile is a roaming profile in which the profile path ends in .man. Removing the .man extension will create a roaming profile, which will not solve the problem.
    C: A super mandatory profile prevents users from saving any changes to their profile, which includes the user’s documents library.
    D: A super mandatory profile is a roaming profile in which the profile path ends in .man. Adding the .dat extension will result in an error.
    https://technet.microsoft.com/en-gb/library/cc732275.aspx
    http://windowsitpro.com/systems-management/inside-user-profiles

    QUESTION 40
    You have a client Windows 10 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed.
    You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive.
    Which Group Policy object (GPO) setting should you configure?

    A.    Allow access to BitLocker-protected fixed data drives from earlier version of Windows.
    B.    Require additional authentication at startup.
    C.    Allow network unlock at startup.
    D.    Configure use of hardware-based encryption for operating system drives.

    Answer: B
    Explanation:
    To make use of BitLocker on a drive without TPM, you should run the gpedit.msc command.
    You must then access the Require additional authentication at startup setting by navigating to Computer Configuration \Administrative Templates\Windows Components\Bit Locker Drive Encryption\Operating System Drives under Local Computer Policy. You can now enable the feature and tick the Allow BitLocker without a compatible TPM checkbox.
    Incorrect Answers:
    A: The Allow access to BitLocker-protected fixed data drives from earlier version of Windows policy setting is used to control whether access to drives is allowed via the BitLocker To Go Reader, and if the application is installed on the drive.
    C: The Allow network unlock at startup policy allows clients running BitLocker to create the necessary network key protector during encryption.
    D: The Configure use of hardware-based encryption for operating system drives policy controls how BitLocker reacts when encrypted drives are used as operating system drives http://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/ https://technet.microsoft.com/en-us/library/jj679890.aspx#BKMK_depopt4

    70-697 dumps full version (PDF&VCE): https://www.lead2pass.com/70-697.html

    Large amount of free 70-697 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDX3RYMG04cEg5aEE

    You may also need:

    70-698 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDa2cwaDdKY1dLdHM

  • [May 2018] 2018 New Released Microsoft 70-534 Exam Dumps Free Download In Lead2pass 230q

    2018 Updated Lead2pass Microsoft 70-534 Exam Questions:

    https://www.lead2pass.com/70-534.html

    QUESTION 41
    Hotspot Question
    Resources must authenticate to an identity provider.
    You need to configure the Azure Access Control service.
    What should you recommend? To answer, select the appropriate responses for each requirement in the answer area. (more…)

  • [May 2018] Lead2pass 2018 100% Valid 70-533 Dumps Guarantee 100% Pass 70-533 Certification Exam 291q

    2018 Exam 70-533 Dumps From Lead2pass Cover All New 70-533 New Questions:

    https://www.lead2pass.com/70-533.html

    QUESTION 41
    You manage a software-as-a-service application named SaasApp1 that provides user management features in a multi-directory environment.
    You plan to offer SaasApp1 to other organizations that use Azure Active Directory.
    You need to ensure that SaasApp1 can access directory objects.
    What should you do?

    A.    Configure the Federation Metadata URL
    B.    Register SaasApp1 as a native client application.
    C.    Register SaasApp1 as a web application.
    D.    Configure the Graph API. (more…)

  • [May 2018] Lead2pass Offering New 70-532 Exam PDF And 70-532 Exam VCE Dumps For Free Downloading 300q

    Official 70-532 Exam Preparation Download From Lead2pass:

    https://www.lead2pass.com/70-532.html

    QUESTION 141
    Which of the following should be measured with a direct cost chargeback method?

    A.    Power and cooling consumed
    B.    CPU cycles used
    C.    Technical staff
    D.    Square footage cost of the facility (more…)

  • [May 2018] Free Share Lead2pass Microsoft 70-414 VCE Dumps With New Update Exam Questions 252q

    Free Share Of Lead2pass 70-414 VCE And PDF Dumps:

    https://www.lead2pass.com/70-414.html

    QUESTION 41
    Your company has three main offices named Main1, Main2, and Main3.
    The network contains an Active Directory domain named contoso.com.
    Each office contains a help desk group.
    You plan to deploy Microsoft System Center 2012 Configuration Manager to meet the following requirements:

    – The members of the Domain Admins group must be able to manage all of the Configuration Manager settings.
    – The help desk groups must be able to manage only the client computers in their respective office by using Configuration Manager.

    You need to recommend a Configuration Manager infrastructure to meet the requirements.
    Which infrastructure should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.

    A.    One site that contains a collection for each office
    B.    Three sites that each contain one collection
    C.    Three sites that contain one collection for each office
    D.    One site that contains one collection (more…)

  • [May 2018] Free Download 70-413 Exam Dumps VCE From Lead2pass 252q

    Free Download Lead2pass Microsoft 70-413 VCE And PDF Dumps:

    https://www.lead2pass.com/70-413.html

    QUESTION 41
    Hotspot Question
    You are planning the certificates for Northwind Traders.
    You need to identify the certificate configurations required for App1.
    How should you configure the certificate request? To answer, select the appropriate options in the answer area. (more…)

  • [May 2018] Download Free Microsoft 70-412 Exam Questions And Answers From Lead2pass 455q

    Lead2pass Dumps For Exam 70-412 With New Updated Exam Questions:

    https://www.lead2pass.com/70-412.html

    QUESTION 81
    Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed.
    Server1 is a file server that contains 3 TB of free disk space.
    HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:\VM and the virtual hard disk file is stored in E:\VHD.
    You plan to replace drive E with a larger volume.
    You need to ensure that VM1 remains available from HV1 while drive E is being replaced.
    You want to achieve this goal by using the minimum amount of administrative effort.
    What should you do?

    A.    Perform a live migration to HV2.
    B.    Add HV1 and HV2 as nodes in a failover cluster. Perform a storage migration to HV2.
    C.    Add HV1 and HV2 as nodes in a failover cluster. Perform a live migration to HV2.
    D.    Perform a storage migration to Server1. (more…)

  • [May 2018] 100% Valid Lead2pass Microsoft 70-411 New Questions Free Version 449q

    Lead2pass 2018 100% Valid 70-411 Dumps Guarantee 100% Pass 70-411 Certification Exam:

    https://www.lead2pass.com/70-411.html

    QUESTION 51
    You have a server named Server 1.
    You enable BitLocker Drive Encryption (BitLocker) on Server 1.
    You need to change the password for the Trusted Platform Module (TPM) chip.
    What should you run on Server1?

    A.    Manage-bde.exe
    B.    Set-TpmOwnerAuth
    C.    bdehdcfg.exe
    D.    tpmvscmgr.exe

    Answer: B
    Explanation:
    The Set-TpmOwnerAuthcmdlet changes the current owner authorization value of the Trusted Platform Module (TPM) to a new value.
    You can specify the current owner authorization value or specify a file that contains the current owner authorization value. If you do not specify an owner authorization value, the cmdlet attempts to read the value from the registry.
    Use the ConvertTo-TpmOwnerAuthcmdlet to create an owner authorization value.
    You can specify a new owner authorization value or specify a file that contains the new value.

    QUESTION 52
    Your company has a main office and two branch offices. The main office is located in Seattle.
    The two branch offices are located in Montreal and Miami.
    Each office is configured as an Active Directory site.
    The network contains an Active Directory domain named contoso.com.
    Network traffic is not routed between the Montreal office and the Miami office.
    You implement a Distributed File System (DFS) namespace named \\contoso.com\public.
    The namespace contains a folder named Folder1. Folder1 has a folder target in each office.
    You need to configure DFS to ensure that users in the branch offices only receive referrals to the target in their respective office or to the target in the main office.
    Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

    A.    Set the Ordering method of \\contoso.com\public to Random order.
    B.    Set the Advanced properties of the folder target in the Seattle office to Last among all targets.
    C.    Set the Advanced properties of the folder target in the Seattle office to First among targets of equal cost.
    D.    Set the Ordering method of \\contoso.com\public to Exclude targets outside of the client’s site.
    E.    Set the Advanced properties of the folder target in the Seattle office to Last among targets of equal cost.
    F.    Set the Ordering method of \\contoso.com\public to Lowest cost.

    Answer: BD
    Explanation:
    If you want to prevent branch clients from failing over to a branch server at a different branch site, select the Exclude targets outside of the client site ordering method for each folder with targets, and then set target priority on each hub server’s folder target by selecting the Last among all targets target priority. The result of selecting these two options is as follows:
    The Exclude targets outside of the client site setting ensures that only targets within the client’s site will be included in referrals.
    The Last among all targets setting overrides the referral ordering method by including the hub server in the referral, even if the hub server is not in the client’s site. (If multiple hub servers are used as folder targets for a given folder, those hub servers will appear last in the referral and be sorted in order of lowest cost after the other targets.)
    https://technet.microsoft.com/en-us/library/cc772778%28v=ws.10%29.aspx

    QUESTION 53
    Hotspot Question
    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Network Policy Server server role installed. The domain contains a server named Server2 that is configured for RADIUS accounting.
    Server1 is configured as a VPN server and is configured to forward authentication requests to Server2.
    You need to ensure that only Server2 contains event information about authentication requests from connections to Server1.

    Which two nodes should you configure from the Network Policy Server console?
    To answer, select the appropriate two nodes in the answer area.

    531

    Answer:

    532

    Explanation:
    In the properties of the Network Policy Server logging of rejected and successful authentication requests can be disabled: Using connection request policies can be defined, whether connection requests are processed locally or forwarded to a remote RADIUS server.

    QUESTION 54
    Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
    You make a change to GPO1.
    You need to force all of the computers in OU1 to refresh their Group Policy settings immediately.
    The solution must minimize administrative effort.
    Which tool should you use?

    A.    Group Policy Object Editor
    B.    The Secedit command
    C.    Group Policy Management Console (GPMC)
    D.    Active Directory Users and Computers

    Answer: C
    Explanation:
    In the previous versions of Windows, this was accomplished by having the user run GPUpdate.exe on their computer.
    Starting with Windows Server?2012 and Windows?8, you can now remotely refresh Group Policy settings for all computers in an OU from one central location through the Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdate cmdlet to refresh Group Policy for a set of computers, not limited to the OU structure, for example, if the computers are located in the default computers container.
    Note: Group Policy Management Console (GPMC) is a scriptable Microsoft Management Console (MMC) snap-in, providing a single administrative tool for managing Group Policy across the enterprise. GPMC is the standard tool for managing Group Policy.
    Incorrect:
    Not B: Secedit configures and analyzes system security by comparing your current configuration to at least one template.
    Reference: Force a Remote Group Policy Refresh (GPUpdate)

    QUESTION 55
    Hotspot Question
    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
    Server1 has the following BitLocker Drive Encryption (BitLocker) settings:

    551

    You need to ensure that drive D will unlock automatically when Server1 restarts. What command should you run?
    To answer, select the appropriate options in the answer area.

    552

    Answer:

    553
    Explanation:
    If BitLocker is enabled on the operating system drive, you can admit when you turn on BitLocker for an integrated data drive that the drive is automatically unlocked when the operating system drive is unlocked.
    The available parameters are part of the cmdlet Add-BitLockerKeyProtector.
    The parameter -ADAccountOrGroupProtector the encryption key can be added to a domain account as a protector.

    QUESTION 56
    Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. All servers run Windows Server 2012 R2.
    You need to collect the error events from all of the servers on Server1. The solution must ensure that when new servers are added to the domain, their error events are collected automatically on Server1.
    Which two actions should you perform?
    (Each correct answer presents part of the solution.
    Choose two.)

    A.    On Server1, create a collector initiated subscription.
    B.    On Server1, create a source computer initiated subscription.
    C.    From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
    D.    From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.

    Answer: BC
    Explanation:
    To set up a Source-Initiated Subscription with Windows Server 2003/2008 so that events of interest from the Security event log of several domain controllers can be forwarded to an administrative workstation
    * Group Policy
    The forwarding computer needs to be configured with the address of the server to which the events are forwarded. This can be done with the following group policy setting:
    Computer configuration-Administrative templates-Windows components-Event forwarding-
    Configure the server address, refresh interval, and issue certificate authority of a target subscription manager.
    * Edit the GPO and browse to Computer Configuration | Policies | Administrative Templates
    | Windows Components | Event Forwarding – Configure the server address, refresh interval, and issuer certificate authority of a target Subscription Manager

    QUESTION 57
    Hotspot Question
    Your company has two offices. The offices are located in Montreal and Seattle.
    The network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2. Server1 is located in the Seattle office. Server2 is located in the Montreal office. Both servers run Windows Server 2012 R2 and have the Windows Server Update Services (WSUS) server role installed.
    You need to configure Server2 to download updates that are approved on Server1 only.
    What cmdlet should you run?
    To answer, select the appropriate options in the answer area.

    571

    Answer:

    572

    Explanation:
    With the cmdlet Set-WsusServerSynchronization can be determined whether a Windows Server Update Services (WSUS) server updates synchronized from Microsoft Update or from an upstream server.
    The parameter -UssServerName server name indicates that you want to synchronize from the specified upstream server.
    The Parameter -Replica configures the Windows Server Update Services (WSUS) for the replica mode.

    QUESTION 58
    You have a server named Server1 that runs Windows Server 2012 R2.
    Server1 has the File Server Resource Manager role service installed.
    Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1.
    You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder 1.
    You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2.
    The solution must not prevent DL1 from receiving notifications about other access-denied messages.
    What should you do?

    A.    From File Explorer, modify the Classification tab of Folder1.
    B.    From the File Server Resource Manager console, modify the Email Notifications settings.
    C.    From the File Server Resource Manager console, set a folder management property.
    D.    From File Explorer, modify the Customize tab of Folder1.

    Answer: C
    Explanation:
    Since the is no SMB Share – Advanced option, the other option is to edit folder management properties.
    https://social.technet.microsoft.com/Forums/office/en-US/dc0dc85c-467d-4d7a-a881-f513157e9331/please-help-me-about-this-question?forum=winservergen
    Also check this:
    “When using the email model each of the file shares, you can determine whether access requests to each file share will be received by the administrator, a distribution list that represents the file share owners, or both.
    The owner distribution list is configured by using the SMB Share – Advanced file share profile in the New Share Wizard in Server Manager.
    You can also use the File Server Resource Manager console to configure the owner distribution list by editing the management properties of the classification properties.”
    https://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK_12

    70-411 dumps full version (PDF&VCE): https://www.lead2pass.com/70-411.html

    Large amount of free 70-411 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDSmRhaVRWcW5Cc1k

    You may also need:

    70-410 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDcXAzcDVNOWI1blU

    70-412 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDcDUzczlzc2N6RkU

    70-413 exam dumps: https://drive.google.com/open?id=1b83z5KIZUL3VTF7QfvaVypTlHDaUnZIE

    70-414 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDdzk4ajRnWG50TzA

  • [May 2018] Lead2pass 70-410 Exam Dumps New Updated By Microsoft Official Exam Center 512q

    70-410 New Questions Free Download In Lead2pass:

    https://www.lead2pass.com/70-410.html

    QUESTION 71
    Your company has a main office and two branch offices. The offices connect to each other by using a WAN link. In the main office, you have a server named Server1 that runs Windows Server 2012 R2. Server1 is configured to use an IPv4 address only.
    You need to assign an IPv6 address to Server1. The IP address must be private and routable. Which IPv6 address should you assign to Server1?

    A.    fe80:ab32:145c::32cc:401b
    B.    ff00:3fff:65df:145c:dca8::82a4
    C.    2001:ab32:145c::32cc:401b
    D.    fd00:ab32:14:ad88:ac:58:abc2:4

    Answer: D

    QUESTION 72
    Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.
    You deploy a server named Server1 that runs Windows Server 2012 R2.
    You install a new client-server application named App1 on Server1 and on the client computers. The client computers must use TCP port 6444 to connect to App1 on Server1. Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080.
    You need to ensure that all of the client computers can connect to App1.
    The solution must ensure that the application can connect to Server2.
    Which Windows Firewall rule should you create on Server1?

    A.    an inbound rule to allow a connection to TCP port 3080
    B.    an outbound rule to allow a connection to TCP port 3080
    C.    an outbound rule to allow a connection to TCP port 6444
    D.    an inbound rule to allow a connection to TCP port 6444

    Answer: D
    Explanation:
    A. Server2 needs inbound on 3080
    B. All ports outbound allowed by default
    D. Server1 gets request from Client PC’s it needs a inbound rule for 6444
    By default, Windows Firewall with Advanced Security blocks all unsolicited inbound networktraffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall.
    If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program.
    http://social.technet.microsoft.com/wiki/contents/articles/13894.troubleshooting-windows-firewall-with-advanced-security-in-windows-server-2012.aspx

    QUESTION 73
    Your network contains an Active Directory domain named contoso.com.
    All user accounts in the sales department reside in an organizational unit (OU) named OU1.
    You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department.
    You discover that the logon script does not run when the sales users log on to their computers. You open Group Policy Management as shown in the exhibit.
    You need to ensure that the logon script in GPO1 is applied to the sales users.
    What should you do?

    731

    A.    Enforce GPO1.
    B.    Modify the link order of GPO1.
    C.    Modify the Delegation settings of GPO1.
    D.    Enable the link of GPO1.

    Answer: D

    QUESTION 74
    Your network contains an Active Directory domain named contoso.com.
    All servers run Windows Server 2012 R2.
    The domain contains a server named Server1.
    You install the Windows PowerShell Web Access gateway on Server1.
    You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway.
    Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.)

    A.    Set-WSManQuickConfig
    B.    Set-WSManInstance
    C.    Add-PswaAuthorizationRule
    D.    Set-BCAuthentication
    E.    Install-PswaWebApplication

    Answer: CE
    Explanation:
    A. Configures the local computer for remote management.
    B. Modifies the management information that is related to a resource.
    C. Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set. D. Specifies the BranchCache computer authentication mode.
    E. Configures the Windows PowerShell ® Web Access web Application in IIS.
    http://technet.microsoft.com/en-us/library/hh849867.aspx
    http://technet.microsoft.com/en-us/library/hh849875.aspx
    http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx

    QUESTION 75
    You have a server named Server 1 that runs Windows Server 2012 R2. Server 1 has the Hyper-V server role installed.
    You have fixed-size VHD named Files.vhd.
    You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements:

    – Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines.
    – Minimize the amount of disk space used.

    What should you do?

    A.    Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file.
    B.    Convert Files.vhd to a dynamically expanding VHD?
    C.    Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file.
    D.    Create differencing VHDs that use Files.vhd as the parent disk.

    Answer: D
    Explanation:
    A. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s
    B. Single VHD not available to multiple VM’s. Changes wouldn’t be reflected
    C. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s
    D. Child disk for multiple VM’s with Files.vhd as parent A differencing disk is associated with another virtual hard disk that you select when you create the differencing disk. This means that the disk to which you want to associate the differencing disk must exist first. This virtual hard disk is called the “parent” disk and the differencing disk is the “child” disk.
    The parent disk can be any type of virtual hard disk.
    The differencing disk stores all changes that would otherwise be made to the parent disk if the differencing disk was not being used. The differencing disk provides an ongoing way to save changes without altering the parent disk.
    You can use the differencing disk to store changes indefinitely, as long as there is enough space on the physical disk where the differencing disk is stored. The differencing disk expands dynamically as data is written to it and can grow as large as the maximum size allocated for the parent disk when the parent disk was created.
    http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx

    QUESTION 76
    Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally.
    You need to identify which servers were restarted during the last two days.
    What should you do?

    A.    Run dsquery computer and specify the -stalepwd parameter
    B.    Run dsquery server and specify the -o parameter.
    C.    Run Get-ADComputer and specify the lastlogon property.
    D.    Run Get-ADComputer and specify the SearchScope parameter

    Answer: C

    QUESTION 77
    Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table (click Exhibit). Server3 is configured to obtain an IP address automatically.
    You need to ensure that Server3 only receives an IP address from Server1.
    The IP address must always be the same.
    Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

    771

    A.    Create an exclusion on Server1.
    B.    Create a filter on Server1.
    C.    Create a reservation on Server2
    D.    Create a reservation on Server1
    E.    Create a filter on Server2.

    Answer: DE
    Explanation:
    A. Exclude range of IP’s for lease
    B. Wrong Server
    C. Wrong Sever
    D. For clients that require a constant IP address, you can either manually configure a static IP address,or assign a reservation on the DHCP server
    E. DHCP Deny Filter at Server2 to exclude MAC address of Server3 MAC address filterEnable and define an explicit allow list. The DHCP server provides DHCP services only to clients whose MACaddresses are in the allow list. Any client that previously received IP addresses is denied address renewal if its MAC address isn’t onthe allow list.
    Enable and define an explicit deny list. The DHCP server denies DHCP services only to clients whose MACaddresses are in the deny list.
    Any client that previously received IP addresses is denied address renewal if its MAC address is on thedeny list.
    Enable and define an allow list and a block list.
    The block list has precedence over the allow list. This means that the DHCP server provides DHCPservices only to clients whose MAC addresses are in the allow list, provided that no corresponding matchesare in the deny list.
    If a MAC address has been denied, the address is always blocked even if the address is on the allowlist.
    http://technet.microsoft.com/en-us/library/cc754537(v=ws.10).aspx http://technet.microsoft.com/en-us/magazine/ff521761.aspx
    http://technet.microsoft.com/en-us/library/cc779507(v=ws.10).aspx

    QUESTION 78
    Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs Windows 8. DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.) Computer1 is configured to obtain an IP address automatically.
    You need to ensure that Computer1 can receive an IP address from DC1.
    What should you do?

    781

    A.    Disable the Allow filters.
    B.    Disable the Deny filters
    C.    Activate Scope [10.1.1.0] Contoso.com.
    D.    Authorize dc1.contoso.com.

    Answer: D
    Explanation:
    Red down arrow indicates a unauthorized DHCP server A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directoryfor the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not completeits startup sequence and automatically shuts down. http://technet.microsoft.com/en-us/library/cc754792.aspx
    http://technet.microsoft.com/en-us/library/ee941131(v=ws.10).aspx http://technet.microsoft.com/en-us/library/gg722802(v=ws.10).aspx
    http://pc-addicts.com/server-2012-dhcp-server-role/

    70-410 dumps full version (PDF&VCE): https://www.lead2pass.com/70-410.html

    Large amount of free 70-410 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDcXAzcDVNOWI1blU

    You may also need:

    70-411 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDSmRhaVRWcW5Cc1k

    70-412 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDcDUzczlzc2N6RkU

    70-413 exam dumps: https://drive.google.com/open?id=1b83z5KIZUL3VTF7QfvaVypTlHDaUnZIE

    70-414 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDdzk4ajRnWG50TzA

Posts navigation