Monday, July 25, 2016

70-413.Lead2pass.Premium.Exam.229q part2

QUESTION 81
You are evaluating the deployment of a multi-site Hyper-V failover cluster in the Miami office and
the Seattle office to host App2.
You need to identify which changes must be made to support the use of the multi-site cluster.
Which changes should you identify?
A. Purchase a storage solution that replicates the virtual machines.
Configure all of the virtual machines to use dynamic memory.
B. Upgrade the WAN link between the Miami and Seattle offices.
Purchase a storage solution that replicates the virtual machines.
C. Configure all of the virtual machines to use dynamic memory.
Implement Distributed File System (DFS) Replication and store the virtual machine files in a
replicated folder.
D. Implement Distributed File System (DFS) Replication and store the virtual machine files in a
replicated folder.
Upgrade the WAN link between the Miami and Seattle offices.
Answer: B
Explanation:
You must have a Fast WAN for Multisite clustering and DFS doesn't work for multisite Hyper-V
Clusters
http://technet.microsoft.com/en-us/library/dd197575%28v=ws.10%29.aspx
70-413.Lead2pass.Premium.Exam.229q part2

QUESTION 82
You need to recommend a software update solution that meets the technical requirements.
What should you recommend deploying to each branch office?
A. An endpoint protection point
B. A distribution point
C. A management point
D. An enrollment proxy point
Answer: B
Explanation:
70-413.Lead2pass.Premium.Exam.229q part2

70-413.Lead2pass.Premium.Exam.229q part2

QUESTION 83
You need to recommend which type of clustered file server and which type of file share must be
used in the Hyper-V cluster that hosts App2.
The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an SMB share.
Does this meet the goal?
A. Yes
B. No
Answer: A
QUESTION 84
You need to recommend which type of clustered file server and which type of file share must be
used in the Hyper-V cluster that hosts App2.
The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an NFS share.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 85
Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM)
infrastructure.
You plan to provide self-service users with the ability to create virtual machines that run Windows
Server 2012 and have the following configurations:
- 8 GB of memory
- The File Server server role
- Windows Internal Database
- A local Administrator password set to 'P@$$w0rd''
You have a VHD that contains a generalized version of Windows Server 2012.
You need to ensure that the self-service users can provision virtual machines that are based on
the VHD.
What should you create? (Each correct answer presents part of the solution. Choose all that
apply.)
A. A Hardware Profile
B. An Application Profile
C. An Application Host Profile
D. A VM Template
E. A Guest OS Profile
Answer: ADE
Explanation:
http://technet.microsoft.com/en-us/library/hh368987.aspx
70-413.Lead2pass.Premium.Exam.229q part2

QUESTION 86
Your network contains an Active Directory domain named contoso.com.
The domain contains multiple servers that are configured as Hyper-V hosts.
You plan to implement four virtual machines.
The virtual machines will be configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2

You need to identify which network must be added to each virtual machine.
Which network types should you identify? To answer, drag the appropriate Network Type to the
correct virtual machine in the answer area. Each Network Type may be used once, more than
once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to
view content.
70-413.Lead2pass.Premium.Exam.229q part2
Explanation:
http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-differenttypes-
of-virtual-networks.aspx
An external network, which provides communication between a virtual machine and a physical
network by creating an association to a physical network adapter on the virtualization server.
An internal network, which provides communication between the virtualization server and virtual
machines.
A private network, which provides communication between virtual machines only.
http://technet.microsoft.com/en-us/library/cc732470%28v=WS.10%29.aspx
QUESTION 87
Your network contains a Hyper-V cluster named Cluster1.
You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
You create a user account for another administrator named User1.
You plan to provide User1 with the ability to manage only the virtual machines that User1 creates.
You need to identify what must be created before you delegate the required permissions.
What should you identify?
A. A cloud
B. A service template
C. A host group
D. A Delegated Administrator
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/gg610645.aspx
You can assign host groups to the Delegated Administrator and the Read-Only Administrator user
roles to scope the user roles to specific host groups.
Members of these user roles can view and manage the fabric resources that are assigned to
them at the host group level.
You can create a private cloud from resources in host groups.
When you create a private cloud, you select which host groups will be part of the private cloud.
You can then allocate all or some of the resources from the selected host groups to the private
cloud.
QUESTION 88
Your network contains four servers,
The servers are configured as shown in the following table.
You manage all of the servers and all of the clusters by using Microsoft System Center 2012
Virtual Machine Manager (VMM).
You plan to implement Dynamic Optimization for the virtual machines.
You need to recommend a configuration for the planned implementation.
What should you recommend?
70-413.Lead2pass.Premium.Exam.229q part2
A. Dynamic Optimization on Cluster3 and Cluster4 only
Virtual machines that are balanced across the clusters
B. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the nodes in the clusters
C. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the clusters
D. Dynamic Optimization on Cluster1 and Cluster2 only
Virtual machines that are balanced across the nodes in the clusters
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/gg675109.aspx
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 89
Your network contains two servers that run Windows Server 2012.
The servers are members of a failover cluster.
Each server has 32 GB of RAM and has the Hyper-V server role installed.
Each server hosts three highly available virtual machines.
All of the virtual machines have an application named App1 installed.
Each of the virtual machines is configured to have 4 GB of memory.
During regular business hours, the virtual machines use less than 2 GB of memory.
Each night, App1 truncates its logs and uses almost 4 GB of memory.
You plan to add another three virtual machines to each host.
The new virtual machines will run the same load as the existing virtual machines.
You need to ensure that all of the virtual machines can run on one of the Hyper-V hosts if a single
host fails.
What should you do?
A. From the properties of each Hyper-V host, modify the Allow virtual machines to span NUMA
nodes.
B. From the properties of each virtual machine, modify the NUMA Configuration-Maximum
amount of memory setting.
C. From the properties of each virtual machine, modify the Smart Paging File Location.
D. From the properties of each virtual machine, modify the Dynamic Memory settings.
Answer: D
Explanation:
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 90
Your network contains an Active Directory domain.
The domain contains 10 file servers.
The file servers connect to a Fibre Channel SAN.
You plan to implement 20 Hyper-V hosts in a failover cluster.
The Hyper-V hosts will not have host bus adapters (HBAs).
You need to recommend a solution for the planned implementation that meets the following
requirements:
- The virtual machines must support live migration.
- The virtual hard disks (VHDs) must be stored on the file servers.
Which two technologies achieve the goal? Each correct answer presents a complete solution.
A. Cluster Shared Volume (CSV)
B. An NFS share
C. Storage pools
D. SMB 3.0 shares
Answer: CD
QUESTION 91
Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
Server1 and Server2 have the Hyper-V server role installed and are members of a failover
cluster.
The network contains a Storage Area Network (SAN) that has a LUN named LUN1.
LUN1 is connected to a 12-TB disk on the SAN.
You plan to host three new virtual machines on the failover cluster.
Each virtual machine will store up to 4 TB of data on a single disk.
The virtual machines will be backed up from the hosts by using the Volume Shadow Copy
Service (VSS).
You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
Which three actions should you perform? To answer, move the three appropriate actions from the
list of actions to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2 Explanation:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 92
Your network contains an Active Directory domain named contoso.com.
The domain contains four servers on a test network.
The servers are configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
You perform the following tasks:
- On Server2F you create an advanced SMB share named Share2A and an
applications SMB share named Share2B.
- On Server3, you create an advanced SMB share named Share3.
- On Server4, you create an applications SMB share named Share4.
You add Server3 and Server4 to a new failover cluster named Clus1.
On Clus1, you configure the File Server for general use role, you create a quick SMB share named
Share5A, and then you create an applications SMB share named Share5B.
You plan to create a failover cluster of two virtual machines hosted on Server1.
The clustered virtual machines will use shared .vhdx files.
You need to recommend a location to store the shared .vhdx files.
Where should you recommend placing the virtual hard disk (VHD)?
A. \\Server3\Share3
B. \\Server2\Share2B
C. \\Clus1\Share5B
D. \\Server4\Share4
Answer: C
QUESTION 93
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
The domain contains six servers.
The servers are configured as shown in the following table.
You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster.
You need to back up the VMM encryption key.
What should you back up?
70-413.Lead2pass.Premium.Exam.229q part2
A. A full system backup of Server1
B. A full system backup of Server3
C. A backup of the Windows\DigitalLocker folder on Server5
D. A backup of the Windows\DigitalLocker folder on Server1
Answer: A
QUESTION 94
You have a Windows Server 2012 R2 failover cluster that contains four nodes.
The cluster has Dynamic Optimization enabled.
You deploy three highly available virtual machines to the cluster by using System Center 2012 R2
Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the
same node.
What should you do?
A. From the Virtual Machine Manager console, modify the Compatibility settings in the
Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the
virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware
Configuration properties of the virtual machines.
Answer: D
Explanation:
The correct answer in the real exam is Anti Affinity command.
Case Study 3: Proseware Inc (QUESTION 95 - QUESTION 103)
Overview
General Overview
Proseware Inc., is a manufacturing company that has 4,000 employees.
Proseware works with a trading partner named Fabrikam, Inc.
Physical Locations
Proseware has a main office and two branch offices.
The main office is located in London.
The branch offices are located in Madrid and Berlin.
Proseware has a sales department based in the London office and a research department based
in the Berlin office.
The offices connect to each other by using a WAN link.
Each office connects directly to the Internet.
Proseware rents space at a hosting company.
All offices have a dedicated WAN link to the hosting company.
Web servers that are accessible from the Internet are located at the hosting company.
Active Directory
The Proseware network contains an Active Directory forest named proseware.com.
The forest contains a single domain. The forest functional level is Windows Server 2012.
Each office contains three domain controllers. An Active Directory site is configured for each office.
System state backups are performed every day on the domain controllers by using System Center
2012 R2 Data Protection Manager (DPM).
Virtualization
Proseware has Hyper-V hosts that run Windows Server 2012 R2.
Each Hyper-V host manages eight to ten virtual machines.
The Hyper-V hosts are configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
All of the Hyper-V hosts store virtual machines on direct-attached storage (DAS).
Servers
All servers run Windows Server 2012 R2.
All of the servers are virtualized, except for the Hyper-V hosts.
VDI1 and VDI2 use locally attached storage to host virtual hard disk (VHD) files.
The VHDs use the .vhd format.
A line-of-business application named SalesApp is used by the sales department and runs on a
server named APP1. APP1 is hosted on HyperV2.
A server named CA1 has the Active Directory Certificate Services server role installed and is
configured as an enterprise root certification authority (CA) named ProsewareCA.
Ten load-balanced web servers hosted on HyperV7 and HyperV8 run the Internet-facing web site
that takes orders from Internet customers.
System Center 2012 R2 Operations Manager is used to monitor the health of the servers on the
network.
All of the servers are members of the proseware.com domain, except for the servers located in the
perimeter network.
Client Computers
All client computers run either Windows 8.1 or Windows 7. Some of the users in the London office
connect to pooled virtual desktops hosted on VDI1 and VDI2.
Problem Statements
Proseware identifies the following issues on the network:
Virtualization administrators report that the load on the Hyper-V hosts is inconsistent.
The virtualization administrators also report that administrators fail to account for host utilization
when creating new virtual machines.
Users in the sales department report that they experience issues when they attempt to access
SalesApp from any other network than the one in the London office.
Sometimes, configuration changes are not duplicated properly across the web servers, resulting in
customer ordering issues. Web servers are regularly changed.
Demand for virtual desktops is increasing. Administrators report that storage space is becoming an
issue as they want to add more virtual machines.
In the past, some personally identifiable information (PII) was exposed when paper shredding
procedures were not followed.
Requirements
Planned Changes
Proseware plans to implement the following changes on the network:
- Implement a backup solution for Active Directory.
- Relocate the sales department to the Madrid office.
- Implement System Center 2012 R2 components, as required.
- Protect email attachments sent to Fabrikam that contain PII data so
that the attachments cannot be printed.
- Implement System Center 2012 R2 Virtual Machine Manager (VMM) to manage
the virtual machine infrastructure. Proseware does not plan to use private
clouds in the near future.
- Deploy a new Hyper-V host named RESEARCH1 to the Berlin office.
RESEARCH1 will be financed by the research department. All of the virtual
machines deployed to RESEARCH1 will use VMM templates.
Technical Requirements
Proseware identifies the following virtualization requirements:
- The increased demand for virtual desktops must be met.
- Once System Center is deployed, all of the Hyper-V hosts must be managed
by using VMM.
- If any of the Hyper-V hosts exceeds a set number of virtual machines,
an administrator must be notified by email.
- Network administrators in each location must be responsible for managing
the Hyper-V hosts in their respective location. The management of the
hosts must be performed by using VMM.
- The network technicians in each office must be able to create virtual
machines in their respective office.
- The network technicians must be prevented from modifying the host server
settings.
- New virtual machines must be deployed to RESEARCH1 only if the virtual
machine template used to create the machine has a value specified for a
custom property named CostCenter' that matches Research'.
The web site configurations must be identical on all web servers.
Security Requirements
Proseware identifies the following security requirements:
- All email messages sent to and from Fabrikam must be encrypted by using
digital certificates issued to users by the respective CA of their company.
No other certificates must be trusted between the organizations.
- Microsoft Word documents attached to email messages sent from Proseware
to Fabrikam must be protected.
- Privileges must be minimized, whenever possible.
QUESTION 95
You need to recommend changes to the virtual desktop infrastructure (VDI) environment.
What should you recommend?
A. Implement Hyper-V replication between VDI1 and VDI2.
B. Create new VDI virtual machines that are Generation 2 virtual machines.
C. Convert the existing VHDs to .vhdx format.
D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the
CSV.
Answer: D
QUESTION 96
You need to recommend changes to the existing environment to meet the web server requirement.
Which two actions should you recommend? Each Answer presents part of the solution.
A. On one web server, run the Start-DSCConfiguration cmdlet.
Create and run a configuration script.
B. On all of the web servers, install the Windows PowerShell Web Access feature,
and then run the Set-DscLocalConfigurationManager cmdlet.
C. On all of the web servers, configure the Local Configuration Manager settings,
and then run the Set-DscLocalConfigurationManager cmdlet.
D. On one web server, install the Windows PowerShell Desired State Configuration (DSC)
feature. Create and run a configuration script.
Answer: CD
QUESTION 97
You are evaluating the use of VMM to migrate APP1 for the sales users.
You need to identify the effects of the migration.
What should you identify?
A. The VHDs and the virtual machine configuration files will move.
The sales users' access to APP1 will be interrupted.
B. The VHDs will move but the virtual machine configuration files will remain in the original
location.
The sales users will continue to have uninterrupted access to APP1.
C. The virtual machine configuration files will move but the VHDs will remain in the original
location.
The sales users' access to APP1 will be interrupted.
D. The VHDs and the virtual machine configuration files will move.
The sales users will continue to have uninterrupted access to APP1.
Answer: D
QUESTION 98
You need to recommend changes to the existing environment to meet the PII requirement.
What should you recommend?
A. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates
from ProsewareCA.
B. Create an AD RMS cluster in Proseware, and then provision the user accounts in Proseware
for the Fabrikam users.
C. Configure Active Directory Federation Services (AD FS) in Fabrikam, and then install a
web application proxy in Proseware.
D. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates
from FabrikamCA.
Answer: B
QUESTION 99
You need to ensure that RESEARCH1 only contains the required virtual machines.
What should you do?
A. Create an availability set.
B. Create a custom placement rule.
C. Set RESEARCH1 as a possible owner.
D. Set RESEARCH1 as a preferred owner.
Answer: B
QUESTION 100
You need to recommend changes to the existing environment to meet the email requirement.
What should you recommend?
A. Implement a two-way forest trust that has selective authentication.
B. Implement qualified subordination.
C. Deploy the FabrikamCA root certificate to all of the client computers.
D. Deploy a user certificate from FabrikamCA to all of the users.
Answer: B
QUESTION 101
You need to implement a solution for the email attachments.
Both organizations exchange root CA certificates and install the certificates in the relevant stores.
You duplicate the Enrollment Agent certificate template and generate a certificate based on the
new template.
Which additional two actions should you perform? Each Answer presents part of the solution.
A. Request cross-certification authority certificates.
B. Create Capolicy.inf files.
C. Request subordinate CA certificates.
D. Create Policy.inf files.
Answer: AD
QUESTION 102
You need to recommend a design that meets the technical requirements for managing the Hyper-
V hosts by using VMM.
What should you recommend? To answer, select the appropriate options in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 103
You need to recommend a monitoring solution for Proseware.
Which three actions should you recommend performing in sequence? To answer, move the
appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Case Study 4: Northwind Traders (QUESTION 104 - QUESTION 114)
Overview
Northwind Traders is an IT services and hosting provider.
Northwind Traders has two main data centers in North America.
The data centers are located in the same city.
The data centers connect to each other by using high-bandwidth, low-latency WAN links.
Each data center connects directly to the Internet.
Northwind Traders also has a remote office in Asia that connects to both of the North American
data centers by using a WAN link.
The Asian office has 30 multipurpose servers.
Each North American data center contains two separate network segments.
One network segment is used to host the internal servers of Northwind Traders.
The other network segment is used for the hosted customer environments.
Existing Environment
Active Directory
The network contains an Active Directory forest named northwindtraders.com.
The forest contains a single domain.
All servers run Windows Server 2012 R2.
Server Environment
The network has the following technologies deployed:
- Service Provider Foundation
- Windows Azure Pack for Windows Server
- System Center 2012 R2 Virtual Machine Manager (VMM)
- An Active Directory Rights Management Services (AD RMS) cluster
- An Active Directory Certificate Services (AD CS) enterprise
certification authority (CA)
All newly deployed servers will include the following components:
- Dual 10-GbE Remote Direct Memory Access (RDMA)-capable network adapters
- Dual 1-GbE network adapters
- 128 GB of RAM
Requirements
Business Goals
Northwind Traders will provide hosting services to two customers named Customer1 and
Customer2.
The network of each customer is configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
Planned Changes
Northwind Traders plans to implement the following changes:
- Deploy System Center 2012 R2 Operations Manager.
- Deploy Windows Server 2012 R2 iSCSI and SMB-based storage.
- Implement Hyper-V Recovery Manager to protect virtual machines.
- Deploy a certificate revocation list (CRL) distribution point (CDP) on
the internal network.
- For Customer 1, install server authentication certificates issued by
the CA of Northwind Traders on the virtual machine in the hosting networks.
General Requirements
Northwind Traders identifies the following requirements:
- Storage traffic must use dedicated adapters.
- All storage and network traffic must be load balanced.
- The amount of network traffic between the internal network and the
hosting network must be minimized.
- The publication of CRLs to CDPs must be automatic.
- Each customer must use dedicated Hyper-V hosts.
- Administrative effort must be minimized, whenever possible.
- All servers and networks must be monitored by using Operations Manager.
- Anonymous access to internal file shares from the hosting network must
be prohibited.
- All Hyper-V hosts must use Cluster Shared Volume (CSV) shared storage
to host virtual machines.
- All Hyper-V storage and network traffic must remain available if single
network adapter fails.
- The Hyper-V hosts connected to the SMB-based storage must be able to
make use of the RDMA technology.
- The number of servers and ports in the hosting environment to which the
customer has access must be minimized.
Customer1 Requirements
Northwind Traders identifies the following requirements for Customer1:
- Customer1 must use SMB-based storage exclusively.
- Customer1 must use App Controller to manage hosted virtual machines.
- The virtual machines of Customer1 must be recoverable if a single data
center fails.
- Customer1 must be able to delegate self-service roles in its hosted
environment to its users.
- Customer1 must be able to check for the revocation of certificates
issued by the CA of Northwind Traders.
- The users of Customer1 must be able to obtain use licenses for documents
protected by the AD RMS of Northwind Traders.
- Certificates issued to the virtual machines of Customer1 that reside on
the hosted networks must be renewed automatically.
Customer2 Requirements
Northwind Traders identifies the following requirements for Customer2:
- Customer2 must use iSCSI-based storage exclusively.
- All of the virtual machines of Customer2 must be migrated by using a
SAN transfer.
- None of the metadata from the virtual machines of Customer2 must be
stored in Windows Azure.
- The network configuration of the Hyper-V hosts for Customer2 must be
controlled by using logical switches.
- The only VMM network port profiles and classifications allowed by
Customer2 must be low-bandwidth, medium-bandwidth, or high-bandwidth.
- The users at Northwind Traders must be able to obtain use licenses for
documents protected by the AD RMS cluster of Customer2. Customer2 plans
to decommission its AD RMS cluster during the next year.
QUESTION 104
You need to recommend a monitoring solution for Northwind Traders.
What is the best approach to achieve the goal? More than one answer choice may achieve the
goal. Select the BEST answer.
A. Three Operations Manager management servers and two Operations Manager gateway
servers
B. One Operations Manager management server
C. Two Operations Manager management servers and three Operations Manager gateway
servers
D. Five Operations Manager management servers
Answer: C
QUESTION 105
You plan to implement a solution that meets the certificate requirements of Customer1.
You need to identify which role services must be deployed to the hosting environment.
Which two role services should you identify? Each Answer presents part of the solution.
A. Certification Authority Web Enrollment
B. Online Responder
C. Certificate Enrollment Policy Web Service
D. Certificate Enrollment Web Service
Answer: CD
QUESTION 106
You need to recommend changes to allow Customer1 to delegate permissions in its hosting
environment to its users.
Where should you recommend performing each task? To answer, select the appropriate location
for each task in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 107
You need to recommend a solution that meets the AD RMS requirements of Customer1 and
Customer2.
Which actions should you recommend performing for each customer? To answer, select the
appropriate customer for each action in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 108
You need to prepare for the migration of virtual machines across the Hyper-V hosts of Customer2.
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 109
You need to recommend a network configuration for the newly deployed Hyper-V hosts used by
Customer1.
On which network adapter should you recommend performing each configuration? To answer,
select the appropriate network adapter for each configuration in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 110
You need to recommend which setting must be applied to the virtualization infrastructure of
Northwind Traders to minimize the impact of multiple virtual machines starting concurrently.
What command should you recommend running? To answer, select the appropriate options in the
answer area.
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 111
You need to prepare the required Hyper-V virtual network components for Customer2.
Which four objects should you create and configure in sequence? To answer, move the appropriate
objects from the list of objects to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 112
You need to implement a Hyper-V Recovery Manager solution in the hosting environment of
Northwind Traders.
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 113
You need to recommend a configuration for the CA extensions of Northwind Traders that meets the
certificate revocation requirement of Customer1.
What should you recommend? To answer, select the appropriate prefix of the target location for the
each extension settings in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 114
Your network contains a main data center and a disaster recovery data center.
Each data center contains a Storage Area Network (SAN).
The main data center contains a two-node failover cluster named Cluster1 that hosts a Microsoft
SQL Server 2012 database named DB1.
The database files in DB1 are stored on the SAN in the main office.
The disaster recovery data center contains a server that runs SQL Server 2012.
You need to recommend a disaster recovery solution for the SQL Server database.
The solution must ensure that the database remains available if the main data center fails.
What should you recommend? More than one answer choice may achieve the goal. Select the
BEST answer.
A. Deploy Distributed File System (DFS) Replication.
B. Extend the failover cluster to the disaster recovery data center.
C. Implement a Cluster Shared Volume (CSV) and move the database files to the CSV.
D. Implement SQL Server database replication between the two data centers.
Answer: D
Explanation:
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 115
Your Active Directory currently contains five virtualized domain controllers that run Windows Server
2012 R2.
The system state of each domain controller is backed up daily.
The backups are shipped to a remote location weekly.
Your company recently implemented a disaster recovery site that contains several servers.
The servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
The disaster recovery site has a high-speed WAN link to the main office.
You need to create an Active Directory recovery plan that meets the following requirements:
- Restores the Active Directory if a catastrophe prevents all access to
the main office.
- Minimizes data loss.
What should you include in the plan?
A. Hyper-V replicas
B. Live migration
C. Virtual machine checkpoints
D. System state restores
Answer: A
QUESTION 116
Your network contains 500 client computers that run Windows 7 and a custom application named
App1.
App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area
Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared folder
can be accessed from Cluster1.
What should you recommend? More than one answer choice may achieve the goal. Select the
BEST answer.
A. The Generic Application cluster role
B. The DFS Namespace Server cluster role
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server for scale-out application data type
Answer: C
QUESTION 117
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the
existing virtual network adapter.
Does this meet the goal?
A. Yes
B. No
Answer: A
QUESTION 118
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: On each Hyper-V server, you create a new external virtual network switch.
From the properties of each virtual machine, you add a second virtual network adapter and connect
the new virtual network adapters to the new external virtual network switches.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 119
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: On each Hyper-V server, you create a new private virtual network switch.
From the properties of each virtual machine, you add a second virtual network adapter and connect
the new virtual network adapters to the new private virtual network switches.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 120
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter.
You connect the new virtual network adapters to the external virtual network switch and configure
the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 121
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Configuration Manager, you create a Collection and a Desired Configuration
Management baseline.
Does this meet the goal?
70-413.Lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: B
QUESTION 122
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
Does this meet the goal?
70-413.Lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: B
QUESTION 123
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Service Level
Tracking object.
Does this meet the goal?
70-413.Lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: A
QUESTION 124
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
70-413.Lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: B
QUESTION 125
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: You create a copy of the User certificate template, and then you modify the extensions of
the copy.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 126
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: From the properties of the Basic EFS template, you assign the Allow-Enroll permission to
the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 127
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity
period of the copy.
Does this meet the goal?
A. Yes
B. No
Answer: A
QUESTION 128
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: From the properties of the User certificate template, you assign the Allow-Enroll
permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 129
Your network contains an Active Directory forest named contoso.com.
The forest contains multiple servers that run Windows Server 2012.
The network contains 1,000 client computers that run Windows 7.
Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
- Generate a list of updates that are applied successfully to all
computers.
- Minimize the amount of bandwidth used to download updates.
- An administrator must approve the installation of an update on any
client computer.
What should you include in the recommendation? (Each Answer presents part of the solution.
Choose all that apply.)
A. Microsoft Asset Inventory Service (AIS)
B. Windows InTune
C. Windows Server Update Services (WSUS)
D. Active Directory Federation Services (AD FS)
E. Microsoft System Center 2012 Service Manager
Answer: ABC
QUESTION 130
Your network contains an Active Directory domain named contoso.com.
The domain contains a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer
accounts of all of the Hyper-V hosts are in organizational unit (OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2.
The virtual machines for Cloud1 will be hosted on two Hyper-V hosts named Server1 and Server2.
The virtual machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal.
Select the BEST answer.
A. Two sites and two Application Administrator (Self-Service User) user roles
B. Two host groups and two Application Administrator (Self-Service User) user roles
C. Two OUs and two Application Administrator (Self-Service User) user roles
D. Two logical units and two Tenant Administrator user roles
Answer: B
QUESTION 131
Your company has three offices.
The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com.
Each office is configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain.
The servers in all three sites are monitored by using Operations Manager.
The company has a web site for its customers.
The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
- Monitor the availability of the web site from locations in North America,
Europe, Asia, and Australia.
- Monitor multi-step requests to the web site.
- Use a central console for monitoring.
What should you include in the recommendation?
A. Import the System Center Global Services Monitoring Management Pack and add the
Web Application Availability Monitoring monitoring type.
B. Add the Web Application Transaction monitoring type and configure watcher nodes.
C. Add the TCP Port monitoring type and configure watcher nodes.
D. Import the System Center Global Services Monitor Management Pack and add the Visual
Studio Web Test Monitoring monitoring type.
Answer: D
QUESTION 132
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1.
The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1.
If the registry key has an incorrect value, the value must be changed.
The registry key must be validated every day.
The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the
goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Answer: B
QUESTION 133
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named
fabrikam.com.
Both forests contain domain controllers that run only Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the
following table.
You need to recommend a certificate solution that meets the following requirements:
- Server authentication certificates issued from fabrikam.com must be
trusted automatically by the
computers in contoso.com.
- The computers in contoso.com must not trust automatically any other
type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?
70-413.Lead2pass.Premium.Exam.229q part2
A. Deploy a Group Policy object (GPO) that defines intermediate CAs.
Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
B. Deploy a Group Policy object (GPO) that defines an enterprise trust.
Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
List Signing.
C. Deploy a Group Policy object (GPO) that defines an enterprise trust.
Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
D. Deploy a Group Policy object (GPO) that defines intermediate CAs.
Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
List Signing.
Answer: B
QUESTION 134
Your network contains an Active Directory domain named contoso.com.
You plan to implement Network Load Balancing (NLB).
You need to identify which network services and applications can be load balanced by using NLB.
Which services and applications should you identify?
A. Microsoft SQL Server 2012 Reporting Services
B. A failover cluster
C. A DHCP server
D. A Microsoft Exchange Server 2010 Mailbox server
E. A file server
F. A Microsoft SharePoint Server 2010 front-end Web server
Answer: AF
QUESTION 135
Your network contains an Active Directory domain named contoso.com.
The domain contains multiple servers that run Windows Server 2012.
All client computers run Windows 7.
The network contains two data centers.
You plan to deploy one file server to each data center.
You need to recommend a solution to provide redundancy for shared folders if a single data center
fails.
What should you recommend? More than one answer choice may achieve the goal. Select the
BEST answer.
A. A Distributed File System (DFS) namespace and DFS Replication
B. Cluster Shared Volumes (CSVs)
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server scale-out application data type
Answer: A
QUESTION 136
You have a Windows Server 2012 R2 failover cluster that contains four nodes.
Each node has four network adapters.
70-413.Lead2pass.Premium.Exam.229q part2
You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic.
What should you do?
A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel.
B. On each server, replace NIC4 with a 1-Gbps network adapter.
C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel.
D. On each server, enable RDMA on NIC4.
Answer: C
QUESTION 137
Your network contains an Active Directory domain named contoso.com.
The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012,
or Windows Server 2008 R2.
The servers run the following enterprise applications:
- Microsoft Exchange Server 2013
- Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain.
Operations Manager monitors all of the servers in the domain.
Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
- A group of administrators must be notified when an error is written to
the System log on the servers that run Exchange Server 2013.
- A group of administrators must be notified when a specific event is
written to The Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the
goal. Select the BEST answer.
A. From Operations Manager, enable audit collection.
B. From Operations Manager, implement two monitors.
C. From Computer Management, implement one event subscription.
D. From Operations Manager, implement two rules.
Answer: D
QUESTION 138
Your company has four offices.
The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers.
The IP addresses of the web proxies at each office are configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application.
The new application has a farm of front-end web servers that connect to a back-end application
server.
When a session to a web server is established, the web server stores data until the session closes.
Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the
web servers.
The solution must ensure that if a web server fails, the users are NOT directed to the failed server.
How should you configure the port rule? To answer, select the appropriate options in the answer
area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 139
Your network contains an Active Directory domain named contoso.com.
The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four
nodes. Cluster1 hosts a web application named App1.
The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB
node.
You need to ensure that all of the users from each of the subnets connect equally across all of the
nodes in Cluster1.
What should you modify from the port settings? To answer, select the appropriate setting in the
answer area.
70-413.Lead2pass.Premium.Exam.229q part2
Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 140
Your network contains an Active Directory domain named contoso.com.
The domain contains two domain controllers named DC1 and DC2.
The domain contains a server named Server1.
Server1 is a certification authority (CA).
All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers.
The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data
recovery agent.
You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.


70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 141
You plan to deploy a certification authority (CA) infrastructure that contains the following servers:
- An offline standalone root CA named CA1
- An enterprise subordinate CA named CA2
On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification
Authorities Certificates store.
You need to ensure that CA2 can issue certificates for the CA hierarchy.
What should you do? To answer, select the appropriate options in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 142
Your network contains five physical servers.
The servers are configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
All servers run Windows Server 2012 R2.
During the setup of VMM, you configure distributed key management.
You need to ensure that the entire VMM infrastructure can be restored.
What should you include in the backup plan? To answer, select the appropriate server to back up
for each backup content type in the answer.
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 143
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM)
is deployed to the domain.
In VMM, you create a host group named HostGroup1.
You add a 16-node Hyper-V failover cluster to HostGroup1.
From Windows PowerShell, you run the following commands:
70-413.Lead2pass.Premium.Exam.229q part2 Use the drop-down menus to select the answer choice that completes each statement70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 144
You are planning to set up a proof-of-concept network virtualization environment.
The environment will contain three servers.
The servers will be configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
You need to enable network connectivity between the virtual machines and Server3.
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2 70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 145
You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
You implement Hyper-V Recovery Manager for the deployment.
You create two new clouds named Cloud1 and Cloud2.
Metadata for both clouds is uploaded to Windows Azure.
You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
Where should you perform each action? To answer, select the appropriate tool for each action in
the answer area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 146
Your network contains an Active Directory forest named contoso.com.
All servers run Windows Server 2012 R2. The forest contains two servers.
The servers are configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
You prepare the forest to support Workplace Join and you enable the Device Registration Service
(DRS) on Server1.
You need to ensure that Workplace Join meets the following requirements:
- Application access must be based on device claims.
- Users who attempt to join their device to the workplace through Server2
must be prevented from
locking out their Active Directory account due to invalid credentials.
Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each
requirement in the answer area.
70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 147
What is the minimum number of certificate servers you need to deploy?
A. 2
B. 3
C. 4
D. 5
Answer: C
Explanation:
70-413.Lead2pass.Premium.Exam.229q part2 70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 148
Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
Server1 and Server2 are members of a failover cluster named Cluster1 and are connected to an
iSCSI Storage Area Network (SAN).
You need to ensure that you can implement the clustered File Server role of the File Server for
scale-out application data type for Cluster1.
What should you install?
A. The iSCSI Target Server cluster role
B. The Distributed Transaction Coordinator (DTC) cluster role
C. The DFS Namespace Server cluster role
D. A Cluster Shared Volume (CSV)
Answer: D
Explanation:
70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 149
Your network contains an Active Directory domain named contoso.com.
The domain contains Server 2012 R2 and has the Hyper-V server role installed.
You need to log the amount of system resources used by each virtual machine.
What should you do?
A. From Windows PowerShell, run the Enable-VMResourceMeteringcmdlet.
B. From Windows System Resource Manager, enable Accounting.
C. From Windows System Resource Manager, add a resource allocation policy.
D. From Windows PowerShell, run the Measure-VM cmdlet.
Answer: A
Explanation:
The Enable-VMResourceMeteringcmdlet collects resource utilization data for a virtual machine or
resource pool.
QUESTION 150
Your network contains an Active Directory domain named contoso.com.
The domain contains a member server named HVServer1.
HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
HVServer1 hosts 10 generation 1 virtual machines.
All of the virtual machines connect to a virtual switch named Switch1.
Switch1 is configured as a private network.
All of the virtual machines have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server1.
You authorize Server1 as a DHCP server in contoso.com.
You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings from
Server1.
You need to ensure that the virtual machines can use Server1 as a DHCP server.
What should you do?
A. Enable MAC address spoofing on Server1.
B. Enable single-root I/O visualization (SR-IOV) on Server1.
C. Disable the DHCP guard on Server1.
D. Disable the DHCP guard on all of the virtual machines that are DHCP clients.
Answer: C
Explanation:
DHCP guard setting
This setting stops the virtual machine from making DHCP offers over this network interface.
To be clear this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP
to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a
DHCP server.
QUESTION 151
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to enable Hyper-V Network Virtualization on Server1.
You need to install the Windows Network Virtualization Filter Driver on Server1.
Which Windows PowerShell cmdlet should you run?
A. Set-NetVirtualizationGlobal
B. Enable-NetAdapterBinding
C. Add - WindowsFeature
D. Set-NetAdapterVmq
Answer: B
Explanation:
Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each
virtual network operates as if it is running as a physical network. The The Set-NetAdaptercmdlet
sets the basic properties of a network adapter such as virtual LAN (VLAN) identifier (ID) and MAC
address. Thus if you add the binding parameter to the command then you will be able to install
the Windows Network Virtualization Filter Driver.
Step one: Enable Windows Network Virtualization (WNV). This is a binding that is applied to the
NIC that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO
NIC team. Either way, it is the network adapter that your External Virtual Switch uses to exit the
server. This also means that if you have multiple virtual networks or multiple interfaces that you
can pick and choose and it is not some global setting.If you have one External Virtual Switch this
is fairly easy:
$vSwitch = Get-VMSwitch -SwitchType External# Check if Network Virtualization is bound#
This could be done by checking for the binding and seeing if it is enabledForEach-Object -
InputObject $vSwitch {if ((Get-NetAdapterBinding -ComponentID "ms_netwnv" -
InterfaceDescription $_.NetAdapterInterfaceDescription).Enabled -eq $false){ # Lets enable
itEnable-NetAdapterBinding -InterfaceDescription $_.NetAdapterInterfaceDescription -
ComponentID "ms_netwnv"}}
QUESTION 152
Your network contains an Active Directory domain named contoso.com.
You install Windows Server 2012 R2 on a new server named Server1 and you join Server1 to the
domain.
You need to ensure that you can view processor usage and memory usage information in Server
Manager.
What should you do?
A. From Server Manager, click Configure Performance Alerts.
B. From Performance Monitor, create a Data Collector Set (DCS).
C. From Performance Monitor, start the System Performance Data Collector Set (DCS).
D. From Server Manager, click Start Performance Counters.
Answer: D
Explanation:
You should navigate to the Server Manager snap-in and there click on All Servers, and then
Performance Counters. The Performance Counters, when started can be set to collect and
display data regarding processor usage, memory usage, amongst many other resources like diskrelated
and security related data, that can be monitored.
http://technet.microsoft.com/en-us/library/bb734903.aspx
QUESTION 153
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed.
The domain contains a virtual machine named VM1.
A developer wants to attach a debugger to VM1.
You need to ensure that the developer can connect to VM1 by using a named pipe.
Which virtual machine setting should you configure?
A. BIOS
B. Network Adapter
C. COM 1
D. Processor
Answer: C
Explanation:
Named pipes can be used to connect to a virtual machine by configuring COM 1.
http://support.microsoft.com/kb/819036
http://support.microsoft.com/kb/141709
QUESTION 154
Your network contains an Active Directory domain named contoso.com.
The domain contains a member server named Server 1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You create an external virtual switch named Switch1.
Switch1 has the following configurations:
- Connection type: External network
- Single-root I/O virtualization (SR-IOV): Enabled
Ten virtual machines connect to Switch1.
You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the
external network and can connect to each other only.
The solution must minimize network downtime for the virtual machines.
What should you do?
A. Remove Switch1 and recreate Switch1 as an internal network.
B. Change the Connection type of Switch1 to Private network.
C. Change the Connection type of Switch1 to Internal network.
D. Remove Switch1 and recreate Switch1 as a private network.
Answer: B
Explanation:
You can change the connection type of a virtual switch from the virtual switch manager without
having to remove it. A private virtual network is isolated from all external network traffic on the
virtualization server, as well any network traffic between the management operating system and
the external network. This type of network is useful when you need to create an isolated
networking environment, such as an isolated test domain.
http://technet.microsoft.com/en-us/library/cc816585%28v=WS.10%29.aspx
http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-differenttypes-
of-virtual-networks.aspx
QUESTION 155
Your network contains two Hyper-V hosts named Host1 and Host2.
Host1 contains a virtual machine named VM1.
Host2 contains a virtual machine named VM2.
VM1 and VM2 run Windows Server 2012 R2.
You install the Network Load Balancing feature on VM1 and VM2.
You need to ensure that the virtual machines are configured to support Network Load Balancing
(NLB).
Which virtual machine settings should you configure on VM1 and VM2?
A. DHCP guard
B. MAC address
C. Router guard
D. Port mirroring
Answer: B
Explanation:
When MAC addresses are not assigned to virtual machines, it could cause network problems.
http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx
QUESTION 156
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, an administrator creates a virtual machine named VM1.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit
button.)
70-413.Lead2pass.Premium.Exam.229q part2
You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet.
What should you instruct User1 to do?
A. Run Windows PowerShell with elevated privileges.
B. Install the Integration Services on VM1.
C. Modify the membership of the local Hyper-V Administrators group.
D. Import the Hyper-V module.
Answer: A
Explanation:
You can only use the PowerShell snap-in to modify the VM settings with the vmcmdlets when you
are an Administrator.
Thus best practices dictate that User1 run the Powershell with elevated privileges.
http://technet.microsoft.com/en-us/library/jj713439.aspx
QUESTION 157
Your network contains an Active Directory domain named contoso.com.
The domain contains two member servers named Server1 and Server2.
All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed.
The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 has access to four physical disks.
The disks are configured as shown in the following table.
70-413.Lead2pass.Premium.Exam.229q part2
You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV).
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Enable BitLocker on Disk4.
B. Disable BitLocker on Disk1.
C. Format Disk2 to use NTFS.
D. Format Disk3 to use NTFS.
Answer: CD
Explanation:
You cannot use a disk for a CSV that is formatted with FAT, FAT32, or Resilient File System (ReFS).
QUESTION 158
Your network contains three servers named HV1, HV2, and Server1 that run Windows Server
2012 R2. HV1 and HV2 have the Hyper-V server role installed.
Server1 is a file server that contains 3 TB of free disk space.
HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored
in D:\VM and the virtual hard disk file is stored in E:\VHD.
You plan to replace drive E with a larger volume.
You need to ensure that VM1 remains available from HV1 while drive E is being replaced.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Perform a live migration to HV2.
B. Add HV1 and HV2 as nodes in a failover cluster.
Perform a storage migration to HV2.
C. Add HV1 and HV2 as nodes in a failover cluster.
Perform a live migration to HV2.
D. Perform a storage migration to Server1.
Answer: D
QUESTION 159
Hotspot Question
Your network contains an Active Directory domain named contoso.com.
You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2.
Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
You plan to create two virtual machines that will run an application named App1.
App1 will store data on a virtual hard drive named App1data.vhdx.
App1data.vhdx will be shared by both virtual machines.
The network contains the following shared folders:
- An SMB file share named Share1 that is hosted on a Scale-Out File Server.
- An SMB file share named Share2 that is hosted on a standalone file
server.
- An NFS share named Share3 that is hosted on a standalone file server.
You need to ensure that both virtual machines can use App1data.vhdx simultaneously.
What should you do? To answer, select the appropriate configurations in the answer area.
image
Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 160
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts 50 virtual machines that run Windows Server 2012 R2.
Your company uses smart cards for authentication.
You need to ensure that you can use smart card authentication when you connect to the virtual
machine by using Virtual Machine Connection.
What should you configure?
A. The NUMA Spanning settings
B. The RemoteFX settings
C. The Enhanced Session Mode Policy
D. The Integration Services settings
Answer: C
QUESTION 161
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
A. Delete the existing snapshots, and then modify the settings of VM1.
B. Right-click VM1, and then click Move. ..
C. Right-click VM1, and then click Export...
D. PauseVM1, and then modify the settings of VM1.
Answer: A
Explanation:
You will need to navigate to the Hyper-V Management snap-in
(C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location
tab where you can change the settings for the VM1 snapshot file location. However, since there
are already several snapshots in existence, you will need to delete them first because you will not
be able to change the location of the snapshot file while there is an existing snapshot.
You need to modify the snapshot file location of VM1.
QUESTION 162
Your network contains an Active Directory domain named contoso.com.
The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows
Server 2012 R2.
All servers have the Hyper-V server role and the Failover Clustering feature installed.
70-413.Lead2pass.Premium.Exam.229q part2
You need to replicate virtual machines from Cluster1 to Cluster2.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A. From Hyper-V Manager on a node in Cluster2, create three virtual machines.
B. From Cluster2, add and configure the Hyper-V Replica Broker role.
C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication.
D. From Cluster1, add and configure the Hyper-V Replica Broker role.
E. From Hyper-V Manager on a node in Cluster2 modify the Hyper-V settings.
Answer: BCD
Explanation:
These are two clusters, to replicate any VM to a cluster you need to configure the Replica Broker
role on each cluster the last step should be enabling replication on the VMs.
Case Study 5: Contoso Ltd Case B (QUESTION 163 - QUESTION 168)
Background
Overview
Contoso, Ltd., is a software development company. The company has a main office in Seattle
and branch offices that are located in Los Angeles and New Delhi. Contoso's sales staff are all
located in the Los Angeles office. Contoso's software developers are all located in the New Delhi
office.
Current Environment
The network for the Seattle office contains:
- 2 domain controllers with integrated DNS
- 200 Windows workstations
- 14-node Hyper-V cluster
- 1 file server with multiple shares
- 1 Active Directory Rights Management Services (AD RMS) cluster
The network for the Los Angeles office contains:
- 2 domain controllers with integrated DNS
- 100 Windows workstations
- 1 file server with multiple shares
The network for the New Delhi office contains:
- 2 domain controllers with integrated DNS
- 300 Windows workstations
- 10 Hyper-V servers that host 100 development virtual machines (VMs)
- 50 production virtual machines that are hosted in Azure
All the Contoso offices connect to each other by using VPN links, and each office is connected to
the Internet.
Contoso has a single Active Directory Domain Services (AD DS) domain named contoso.com.
Contoso.com has a configured certification authority (CA). Contoso currently leverages System
Center Virtual Machine Manager 2012 R2 to manage its virtual environment servers.
Contoso uses an application named HRApp1 for its human resources (HR) department. HR users
report that the application stops responding and must be restarted before they can continue their
work.
Fabrikam Inc
Contoso has recently acquired Fabrikam. Inc. Fabrikam has a single office that is located in
Seattle.
Fabrikam has a single AD DS domain named fabrikam.com.
The network for Fabrikam contains:
- 2 domain controllers with Active Directory-integrated DNS
- 150 Windows workstations
- 5 Hyper-V servers
- 1 file server with multiple shares
A two-way trust exists between Contoso.com and Fabrikam.com.
Business Requirements
Consolidation
Contoso must complete the consolidation of the Contoso and Fabrikam networks.
The consolidation of the two networks must:
- Minimize all hardware and software costs.
- Minimize WAN traffic.
- Enable the users by providing self-service whenever possible.
Security
Contoso requires that all Windows client devices must be encrypted with BitLocker by using the
Trusted Platform
The CA for the domain contoso.com must be designated as the resource forest. The domain
fabrikam.com must leverage certificates that are issued by the domain contoso.com.
Other Information
HRApp1
Each time HRApp1 stops responding and is restarted, an incident must be created and
associated with the existing problem ticket.
Development environment
You have the following requirements:
- Developers must be able to manage their own VM checkpoints.
- You must implement a disaster recovery strategy for development
virtual machines.
Technical Requirements
Windows System Updates
You have the following system update requirements:
- Consolidate reporting of all software updates in all offices.
- Software updates must be applied to all Windows devices.
- Ensure the ability to report on update compliance.
Monitoring
You have the following monitoring requirements:
- Each time HRApp1 shows performance problems, ensure that a ticket is
created.
- When performance problems are resolved, ensure that the ticket closes
automatically.
Security
You have the following security requirements:
- Ensure that all documents are protected.
- Ensure that contoso.com domain users get use licenses for RMSprotected
documents from the domain contoso.com.
- Ensure that fabrikam.com domain users get use licenses for RMSprotected
documents from the domain contoso.com.
QUESTION 163
Drag and Drop Question
You need to implement the network Unlock feature to meet the BitLocker requirements.
In which order should you perform the actions? To answer, move all actions from the list of
actions to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2
Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 164
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following actions:
- In Virtual Machine Manager, you create a new user role named DevUsers
that uses the Application Administrator profile.
- You grant Checkpoint permissions to the DevUsers role.
- You distribute the Self-Service Portal URL to the developers.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 165
This question consists of two statements: One is named Assertion and the other is named
Reason. Both of these statements may be true; both may be false; or one may be true, while the
other may be false.
To answer this question, you must first evaluate whether each statement is true on its own.
If both statements are true, then you must evaluate whether the Reason (the second statement)
correctly explains the Assertion (the first statement). You will then select the answer from the list
of answer choices that matches your evaluation of the two statements.
Assertion:
You must implement a Windows Server Gateway in the Seattle office.
Reason:
A Windows Server Gateway will prevent users from saving documents outside of the Seattle
location.
Evaluate the Assertion and Reason statements and choose the correct answer option.
A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the
Assertion.
B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the
Assertion.
C. The Assertion is true, but the Reason is false.
D. The Assertion is false, but the Reason is true.
E. Both the Assertion and the Reason are false.
Answer: C
QUESTION 166
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following tasks:
- In Virtual Machine Manager, you create a new user role named DevUsers
that uses the Application Administrator profile,
- You add the virtual machines to the DevUsers role.
- You grant Checkpoint permissions to the DevUsers role.
- You install and configure App Controller.
- You distribute the App Controller console URL to the developers.
Does this meet the goal?
A. Yes
B. No
Answer: A
Explanation:
Virtual Machine Manager Self-Service Portal The VMM Self-Service Portal is an optional, Webbased
component that a VMM administrator can install and configure to allow users to create and
manage their own virtual machines within a controlled environment on a limited group of virtual
machine hosts. The VMM administrator creates self-service user roles which determine the scope
of the users' actions on their own virtual machines. To create, operate, and manage virtual
machines, self-service users use the Virtual Machine Manager Self-Service Portal. The
administrator determines which host groups self-service users can create virtual machines on.
When a self-service user creates a virtual machine, the virtual machine is automatically placed on
the most suitable host in the host group based on host ratings.
https://technet.microsoft.com/en-us/library/cc764267.aspx
QUESTION 167
You need to design a solution that meets all of the software update requirements.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Implement System Center Service Manager.
B. Deploy a configuration baseline to all devices.
C. Implement System Center Operations Manager.
D. Implement System Center Configuration Manager.
Answer: BC
QUESTION 168
This question consists of two statements: One is named Assertion and the other is named
Reason. Both of these statements may be true; both may be false; or one may be true, while the
other may be false.
To answer this question, you must first evaluate whether each statement is true on its own. If both
statements are true, then you must evaluate whether the Reason (the second statement)
correctly explains the Assertion (the first statement). You will then select the answer from the list
of answer choices that matches your evaluation of the two statements.
Assertion:
You must implement Azure site recovery between the New Delhi and Seattle offices to meet the
backup requirements.
Reason:
Azure site recovery allows replication and failover of virtual machines on host servers that are
located in the Virtual Machine Manager cloud.
Evaluate the Assertion and Reason statements and choose the correct answer option.
A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the
Assertion.
B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the
Assertion.
C. The Assertion is true, but the Reason is false.
D. The Assertion is false, but the Reason is true.
E. Both the Assertion and the Reason are false.
Answer: B
Case Study 6: Contoso Ltd Case C (QUESTION 169 - QUESTION 178)
Background
Overview
Contoso, Ltd., is a manufacturing company. The company has offices in Chicago and Seattle.
Each office contains two data centers. All of the data centers and sites for the company have
network connectivity to each other. The company uses a single Active Directory Domain Services
(AD DS) domain.
Contoso is growing rapidly and needs to expand its computer infrastructure.
Current Environment Chicago Office
The Chicago office contains a primary data center and a backup data center. A Hyper-V cluster
named Clusterl.contoso.com resides in the primary data center. The cluster has a multiple
network path configured. The cluster includes two unused SQL Server virtual machines (VMs)
named SQL-SERVER1 and SQL-SERVER2. The cluster also includes a Hyper-V Host group
named Chi-Primary.
Clusterl.contoso.com contains the following servers:
- CHI1-HVNODE1.contoso.com
- CHI1-HVNODE2.contoso.com
- CHI1-HVNODE3.contoso.com
- CHI1-HVNODE4.contoso.com
The backup data center for the Chicago office is located on a Hyper-V cluster named
Cluster2.contoso.com. The cluster has a single network path configured. The cluster includes a
Hyper-V Host group named Chi-Backup.
Cluster2.contoso.com contains the following servers:
- CHI2-HVNODEl.contoso.com
- CHI2-HVNODE2.contoso.com
- CHI2-HVNODE3.contoso.com
- CHI2-HVNODE4.contoso.com
In addition, the Chicago office contains two standalone Hyper-V servers named CHIHVSERVER1.
contoso.com and CHI-HVSERVER2.contoso.com.
There are also four newly built servers:
- CHI-SERVERl.contoso.com
- CHI-SERVER2.contoso.com
- CHI-SERVER3.contoso.com
- CHI-SERVER4.contoso.com
All the servers in the Chicago office run Windows Server 2012. Any future servers that are
deployed in the Chicago office must also run Windows Server 2012.
All servers in the Chicaoo office use the subnet 10.20.xx.
Current Environment Seattle Office
The Seattle office contains a primary data center and a backup data center. The primary data
center is located on a Hyper-V cluster named Cluster3.contoso.com. The cluster has a multiple
network path configured. The cluster includes two unused SQL Server virtual machines named
SQL-SERVER3 and SQL-SERVERS The cluster includes a Hyper-V Host group named Sea-
Primary.
Cluster3.contoso.com contains the following servers:
- SEA3-HVNODEl.contoso.com
- SEA3-HVNODE2.contoso.com
- SEA3-HVNODE3.contoso.com
- SEA3-HVNODE4.contoso.com
The backup data center for the Seattle office is located on a Hyper-V cluster named
Cluster4.contoso.com. The cluster has a single network path configured.
The cluster includes a Hyper-V Host group named Sea-Backup.
Cluster4.contoso.com contains the following servers:
- SEA4-HVNODEl.contoso.com
- SEA4-HVNODE2.contoso.com
- SEA4-HVNODE3.contoso.com
- SEA4-HVNODE4.contoso.com
In addition, the Seattle office contains two standalone Hyper-V servers named SEAHVSERVERl.
contoso.com and SEA-HVSERVER2.contoso.com.
There are also four newly built servers:
- SEA-SERVERl.contoso.com
- SEA-SERVER2.contoso.com
- SEA-SERVER3.contoso.com
- SEA-SERVER4.contoso.com
All servers in the Seattle office run Windows Server 2012 R2. Any future servers that are
deployed in the Seattle office must also run Windows Server 2012 R2.
All servers in the Seattle office use the subnet 10.10.x.x.
Business Requirements
Apps
Contoso plans to deploy new applications to make its departments more efficient.
App1
Contoso must create a new application named App1 for the human resources (HR) department.
The infrastructure for App1 must reside in a virtual environment and the data files for App1 must
reside on a single shared disk.
In addition, the infrastructure for App1 must meet the following requirements:
- maximize data protection
- withstand the loss of a single guest virtual machine
- withstand the loss of a single physical server
To support App1, Contoso must deploy a new cluster named Applcluster.contoso.com.
The cluster has the following requirements:
- It must span multiple sites.
- It must support dynamic quorums.
- It must prevent failures caused by a 50% split.
App2
Contoso must create a new application named App2. To support App2, Contoso must deploy a
new SQL Server cluster. The cluster must not be part of the domain.
The server deployment team that will install the cluster has limited permissions. The server
deployment team does not have the ability to create objects in Active Directory.
Virtualization and Storage
New VMs
Any new VMs that are deployed to the Hyper-V cluster in Cluster3.contoso.com have the
following requirements:
- New SQL Server VMs must be deployed only to odd-numbered servers in
the cluster.
- All other new VM guests must be deployed to any available server in
the cluster.
New VDE
The company needs a highly available file share cluster for a new Virtual Desktop Environment
(VDE). It has the following requirements:
- The file share cluster must withstand the loss of a single server.
- The file share cluster must withstand the loss of a single network
path.
- The file share cluster must use the least amount of disk space.
New virtualized SQL Server cluster
Contoso must create a new application for manufacturing. The company needs a new virtualized
SQL Server cluster named VM-SQLclusterl.contoso.com.
It has the following requirements:
- The cluster must use a shared virtual hard disk.
- The cluster must have two nodes named VM-SQL-NODE1.contoso.com and
VM-SQL-NODE2.contoso.com.
Highly available storage solution
The company is deploying new hardware that will replace the existing Hyper-V clusters.
The new file share cluster must have a highly available storage solution for a Hyper-V
environment.
It has the following requirements:
- The new file share cluster must support guest VM clusters.
- The storage cannot reside on any of the physical Hyper-V hosts.
QUESTION 169
You need to enable virtual machine network health detection on all supported clusters.
What should you do?
A. On the virtual machine settings page for Cluster4, select the Protect network checkbox for
each virtual machine on the cluster.
B. On the virtual machine settings page for Cluster1, select the Protect network checkbox for
each virtual machine on the cluster.
C. On each guest virtual machine in Cluster4, configure protected access for the network
interface card.
D. On each guest virtual machine in Cluster3, configure protected access for the network
interface card.
E. On the virtual machine settings page for Cluster3, select the Protect network checkbox for
each virtual machine on the cluster.
F. On each guest virtual machine in Cluster1, configure protected access for the network
interface card.
Answer: B
QUESTION 170
Hotspot Question
You plan to configure Windows Network Load Balancing (NLB) for a company.
You display following Network Load Balancing Manager window:
70-413.Lead2pass.Premium.Exam.229q part2
Use the drop-down menus to select the answer choice that answers each question based on the
information presented in the graphic.
70-413.Lead2pass.Premium.Exam.229q part2
Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 171
Drag and Drop Question
You need to implement Windows Network Load Balancing (NLB).
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in correct order.70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2
QUESTION 172
Drag and Drop Question
You need to collect the required security logs.
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.
70-413.Lead2pass.Premium.Exam.229q part2
  ES TK PS AT OB
 
Test King
Pass4sure
Actual Tests
Other Brands
Customer Reviews 5stars 1star 1star 1star 1star
 
$89.99
$124.99
$125.99
$189.00
$29.99~$49.99
Up-To-Dated Available NotAvailable NotAvailable NotAvailable NotAvailable
Real Questions & Answers Available NotAvailable NotAvailable NotAvailable NotAvailable
Correct All Error Available NotAvailable NotAvailable NotAvailable NotAvailable
Premium VCE Dumps Available NotAvailable NotAvailable NotAvailable NotAvailable
Free VCE Simulator Available NotAvailable NotAvailable NotAvailable NotAvailable
Unlimited After One Time Purchasing Available NotAvailable NotAvailable NotAvailable NotAvailable
Instant Download Available NotAvailable NotAvailable NotAvailable NotAvailable
Printable PDF Dumps Available NotAvailable NotAvailable NotAvailable NotAvailable
100% Pass Guarantee Available NotAvailable NotAvailable NotAvailable NotAvailable
100% Money Back Available NotAvailable NotAvailable NotAvailable NotAvailable

100% Pass:http://examsavior.com/

No comments:

Post a Comment