Recertification for MCSE: Server Infrastructure
Question No: 221 – (Topic 8)
Your network contains three networks named LAN1, LAN2, and LAN3. You have a Hyper- V host named Hyper1 that has Windows Server 2012 installed. Hyper1 has three network adapters.
The network adapters are configured as shown in the following table. Hyper1 hosts 10 virtual machines. A virtual machine named VM1 runs a line-of-business application that is used by all of the users of LAN1. All of the other virtual machines are connected to LAN2.
You need to implement a solution to ensure that users can access VM1 if either NIC1 or NIC2 fails.
What should you do?
From the properties of each virtual network adapter, enable network adapter teaming,
and then modify the bandwidth management settings.
From the properties of each virtual network adapter, enable network adapter teaming, and then enable virtual LAN identification.
From the properties of each physical network adapter, enable network adapter teaming, and then add a second legacy network adapter to VM1.
From the properties of each physical network adapter, enable network adapter teaming, and then create a virtual switch.
Question No: 222 DRAG DROP – (Topic 8)
You use the entire System Center suite. You integrate Service Manager with Operations Manager, Virtual Machine Manager, Orchestrator, and Active Directory. You perform all remediation by using Orchestrator runbooks. An application experiences performance problems on a periodic basis.
You have the following requirements:
-> A new incident must be opened when System Center Operations Manager (SCOM) detects a performance problem.
-> The incident must be closed when the performance problem is resolved.
-> The incident must be associated with the HR performance problem in Service Manager.
You need to configure the environment.
Question No: 223 – (Topic 8)
You are an Active Directory administrator for Contoso, Ltd. You have a properly configured certification authority (CA) in the contoso.com Active Directory Domain Services (AD DS) domain. Contoso employees authenticate to the VPN by using a user certificate issued by the CA.
Contoso acquires a company named Litware, Inc., and establishes a forest trust between contoso.com and litwareinc.com. No CA currently exists in the litwareinc.com AD DS domain. Litware employees do not have user accounts in contoso.com and will continue to use their litwareinc.com user accounts.
Litware employees must be able to access Contoso#39;s VPN and must authenticate by using a user certificate that is issued by Contoso#39;s CA.
You need to configure cross-forest certificate enrollment for Litware users.
Which two actions should you perform? Each correct answer presents part of the solution.
Grant the litwareinc.com AD DS Domain Computers group permissions to enroll for the VPN template on the Contoso CA.
Copy the VPN certificate template from contoso.com to litwareinc.com.
Add Contoso#39;s root CA certificate as a trusted root certificate to the Trusted Root Certification Authority in litware.com.
Configure clients in litwareinc.com to use a Certificate Policy server URI that contains the location of Contoso#39;s CA.
Question No: 224 HOTSPOT – (Topic 8)
You need to create a script to deploy DFS replication.
Which Windows PowerShell commands should you add to the script? To answer, select the appropriate Windows PowerShell commands in each list in the answer area.
Question No: 225 – (Topic 8)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
Server1 and Server2 are members of a failover cluster named Cluster1 and are connected to an iSCSI Storage Area Network (SAN).
You need to ensure that you can implement the clustered File Server role of the File Server for scale-out application data type for Cluster1.
What should you install?
The iSCSI Target Server cluster role
The Distributed Transaction Coordinator (DTC) cluster role
The DFS Namespace Server cluster role
A Cluster Shared Volume (CSV)
Question No: 226 DRAG DROP – (Topic 8)
You are planning to set up a proof-of-concept network virtualization environment.
The environment will contain three servers. The servers will be configured as shown in the following table.
VMM will be used to manage the virtualization environment.
Server2 runs three virtual machines. All of the virtual machines are configured to use network virtualization.
You need to enable network connectivity between the virtual machines and Server3.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Question No: 227 – (Topic 8)
You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of MFA Server and connect it to your Microsoft Azure MFA provider. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.
Does this meet the goal?
Reference: Setting up on-premises conditional access using Azure Active Directory Device Registration
Question No: 228 – (Topic 8)
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
Solution: You configure preferred and possible owners for each business-critical VM. Does this meet the goal?
Question No: 229 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:
-> Microsoft Exchange Server 2013
-> Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
-> A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013.
-> A group of administrators must be notified when a specific event is written to The
Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
From Operations Manager, enable audit collection.
From Operations Manager, implement two monitors.
From Computer Management, implement one event subscription.
From Operations Manager, implement two rules.
Question No: 230 – (Topic 8)
Your network contains a data center named DataCenter1 that contains multiple servers. The servers are configured as Hyper-V hosts.
Your company deploys a disaster recovery site. The disaster recovery site has a dedicated connection to DataCenter1.
The network is connected to the disaster recovery site by using a dedicated link.
DataCenter1 contains 10 business critical virtual machines that run a line-of-business application named App1.
You need to recommend a business continuity solution to ensure that users can connect to App1 within two hours if DataCenter1 fails.
What should you include in the recommendation?
More than one answer choice may achieve the goal. Select the BEST answer.
From Microsoft System Center 2012 Virtual Machine Manager (VMM), implement live migration on the virtual machines.
From Hyper-V Manager, implement Hyper-V replicas.
From Microsoft System Center 2012 Data Protection Manager, implement a protection group.
From Hyper-V Manager, create snapshots of the virtual machines.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|