READ Free Dumps For Microsoft- 70-410
Question ID 9761 | You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine
named VM1.VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
|
Option A | Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet.
|
Option B | Add a second legacy network adapter, and then run the Set-VMNetworkAdopter cmdlet
|
Option C | Add a second legacy network adapter, and then configure network adapter teaming.
|
Option D | Remove the legacy network adapter, and then add a network adapter
|
Correct Answer | D |
Explanation Explanation/Reference: Explanation: A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the management operating system B. The legacy network adapter doesn't support bandwidth management C. The legacy network adapter doesn't support bandwidth management D. Add a New network adapter The legacy network adapter doesn't support bandwidth management
Question ID 9762 | Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the
network.
Which setting in the rule should you configure?
|
Option A | Interface types
|
Option B | Authorized computers
|
Option C | Remote IP address
|
Option D | Edge traversal
|
Correct Answer | D |
Explanation Explanation/Reference: Explanation: Edge traversal - This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device. Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device. Reference: http://technet.microsoft.com/en-us/library/cc731927.aspx