Implementing an Advanced Server Infrastructure
Question No: 101 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains four servers on a test network. The servers are configured as shown in the following table.
Server1 uses the storage shown in the following table.
You perform the following tasks:
->On Server2, you create an advanced SMB share named Share2A and an applications SMB share named Share2B.
->On Server3, you create an advanced SMB share named Share3.
->On Server4, you create an applications SMB share named Share4.
->You add Server3 and Server4 to a new failover cluster named Clus1.
->On Clus1, you configure the File Server for general use role, you create a quick SMB share named Share5A, and then you create an applications SMB share named Share5B.
You plan to create a failover cluster of two virtual machines hosted on Server1. The clustered virtual machines will use shared .vhdx files.
You need to recommend a location to store the shared .vhdx files. Where should you recommend placing the virtual hard disk (VHD)?
Question No: 102 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You create an external virtual switch named Switch1.
Switch1 has the following configurations:
->Connection type: External network
->Single-root I/O virtualization (SR-IOV): Enabled
Ten virtual machines connect to Switch1.
You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines.
What should you do?
Remove Switch1 and recreate Switch1 as an internal network.
Change the Connection type of Switch1 to Private network.
Change the Connection type of Switch1 to Internal network.
Remove Switch1 and recreate Switch1 as a private network.
Answer: B Explanation:
You can change the connection type of a virtual switch from the virtual switch manager without having to remove it.
A private virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network.
This type of network is useful when you need to create an isolated networking environment, such as an isolated test domain.
Question No: 103 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System center 2012 infrastructure. The domain contains the computers configured as shown in the following table.
You need to implement a monitoring solution that gathers the security logs from all of the computers in the domain.
Which monitoring solution should you implement? More than one answer choice may achieve the goal. Select the BEST answer.
Data Collector Sets (DCSs)
Desired Configuration Management in Configuration Manager
Audit Collection Services (ACS) in Operations Manager
Question No: 104 – (Topic 8)
Your network contains an Active Directory forest named contoso.com. The forest contains multiple servers that run Windows Server 2012. The network contains 1,000 client computers that run Windows 7. Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
->Generate a list of updates that are applied successfully to all computers.
->Minimize the amount of bandwidth used to download updates.
->An administrator must approve the installation of an update on any client computer.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
Microsoft Asset Inventory Service (AIS)
Windows Server Update Services (WSUS)
Active Directory Federation Services (AD FS)
Microsoft System Center 2012 Service Manager
Question No: 105 DRAG DROP – (Topic 8)
You use the entire System Center suite. You integrate Service Manager with Operations Manager, Virtual Machine Manager, Orchestrator, and Active Directory. You perform all remediation by using Orchestrator runbooks. An application experiences performance problems on a periodic basis.
You have the following requirements:
->A new incident must be opened when System Center Operations Manager (SCOM) detects a performance problem.
->The incident must be closed when the performance problem is resolved.
->The incident must be associated with the HR performance problem in Service Manager.
You need to configure the environment.
Question No: 106 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
All client computers have a custom application named App1 installed. App1 generates an Event ID 42 every time the application runs out of memory.
Users report that when App1 runs out of memory, their client computer runs slowly until they manually restart App1.
You need to recommend a solution that automatically restarts App1 when the application runs out of memory. The solution must use the least amount of administrative effort.
What should you include in the recommendation?
From Configurations Manager, create a desired configuration management baseline.
From Windows System Resource Manager, create a resource allocation policy.
From Event Viewer, attach a task to the event.
From Operations Manager, create an alert.
Question No: 107 – (Topic 8)
Your network contains servers that run only Windows Server 2012.
You have five storage pools. The storage pools are configured as shown in the following table.
You need to identify which storage pools can be used as clustered disk resources.
Which storage pools should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
Explanation: The clustered storage pool MUST be comprised of Serial Attached SCSI (SAS) connected physical disks.
Note: SAS, Serial Attached SCSI, is an evolution of parallel SCSI into a point-to-point serial peripheral interface in which controllers are linked directly to disk drives.
Not B, not C, not E: iSCSI and Fibre Channel controllers are not supported.
Reference: Deploy Clustered Storage Spaces https://technet.microsoft.com/en-us/library/jj822937.aspx
Question No: 108 – (Topic 8)
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You run the following command from an administrative command prompt:
cipher /a /d /s:lt;protected share namegt;
Does this meet the goal?
Explanation: If you plan to remove Active Directory Rights Management Services from your organization, you should first decommission the AD RMS cluster. This allows your AD RMS users to remove AD RMS protection from existing content. If you uninstall AD RMS without first decommissioning it, your protected content will no longer be accessible.
Question No: 109 – (Topic 8)
Your network contains an Active Directory domain. The domain contains 10 file servers. The file servers connect to a Fibre Channel SAN. You plan to implement 20 Hyper-V hosts in a failover cluster.
The Hyper-V hosts will not have host bus adapters (HBAs).
You need to recommend a solution for the planned implementation that meets the following requirements:
->The virtual machines must support live migration.
->The virtual hard disks (VHDs) must be stored on the file servers.
Which two technologies achieve the goal? Each correct answer presents a complete solution.
Cluster Shared Volume (CSV)
An NFS share
SMB 3.0 shares
Question No: 110 – (Topic 8)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches.
Does this meet the goal?
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|