70-412 Ch 1-5 Computer Science

25 July 2022
4.7 (114 reviews)
110 test answers

Unlock all answers in this set

Unlock answers (106)
question
A production-ready failover cluster requires what minimum number of nodes?
answer
Two ***To create a failover using Windows Server 2012, you need a minimum of two servers that meet the minimum requirements of Windows Server 2012 and that have identical hardware components.
question
There are many requirements that must be met in order to build a failover cluster using Windows Server 2012. Which of the items listed here is not an actual requirement you must meet?
answer
All servers must be joined to an Active Directory domain ***Correctly stated, this requirement is that all servers in the failover cluster must be joined to the same Active Directory domain.
question
What type of quorum configuration can sustain the loss of one-half of the cluster nodes (rounded up), minus one?
answer
Node Majority ***The Node Majority quorum type can sustain the loss of one-half of the cluster nodes (rounded up), minus one.
question
In Windows Server 2012, how many virtual machines can be utilized in a cluster?
answer
4,000 ***In Windows Server 2012, a failover cluster can have 64 physical nodes and can run 4,000 virtual machines on each cluster.
question
In a failover cluster configured on Windows Server 2012, how are heartbeats transmitted?
answer
Using UDP port 3343 unicast ***Cluster nodes are kept aware of the status of the other nodes and services through the use of heartbeats. Heartbeats transmit and receive using UDP port 3343 unicast (legacy clusters used UDP broadcast).
question
When failover clusters connect to, and use, a shared storage device using Fibre Channel, what name is given to the Fibre Channel network?
answer
The fabric ***If the cluster communicates to shared storage using Fibre Channel, the Fibre Channel will connect using a dedicated network known as a fabric.
question
Which storage technology is a low-cost option that typically requires the cluster nodes to be physically close to the drives?
answer
SAS ***Shared serial attached SCSI (SAS) is a low-cost option that requires the cluster nodes to be physically close to the drives. Typically, the SAS has a limited number of connections for cluster nodes.
question
How are storage devices typically assigned to only a single cluster on the network?
answer
By using LUN masking or zoning ***A storage device can be assigned to only one cluster. This is usually accomplished with logical unit number (LUN) masking or zoning.
question
Cluster Shared Volume, in Windows Server 2012, offers faster throughput when integrated with what?
answer
Server Message Block (SMB) Multichannel ***CSV in Windows Server 2012 offers multisubnet support for CSVs so you can achieve faster throughput when integrated with Server Message Block (SMB) Multichannel and it allows the network adapters to support Remote Direct Memory Access (RDMA).
question
In a cluster with an even number of nodes, what must be used to break ties during node failure?
answer
A witness ***If there is an even number of nodes in a cluster, then the cluster needs to have a witness assigned to the cluster to break the tie during failures of cluster nodes. The witness can be either a disk or a file share.
question
Which PowerShell cmdlet would be used to add a new resource group to a failover cluster configuration?
answer
Add-ClusterGroup ***You would need to use the Add-ClusterGroup cmdlet to add an empty resource group to the failover cluster configuration, in preparation for adding clustered resources to the group.
question
Which PowerShell cmdlet would you need to use to configure the possible nodes that can own a resource in a failover cluster?
answer
Set-ClusterOwnerNode ***You would need to use the Set-ClusterOwnerNode cmdlet to specify which nodes can own a resource in a failover cluster or to specify the order of preference among owner nodes for a clustered role, or a resource group.
question
What mode of Cluster Aware Updating has an administrator triggering the updates manually from the orchestrator?
answer
Remote-updating mode ***With remote-updating mode, you install the failover clustering administrative tools on a CAU orchestrator (a remote computer running Windows 8 or Windows Server 2012 that is not a member of the cluster). The CAU is included in the Remote Server Administration Tool (RSAT). The administrator triggers the update process on the orchestrator computer.
question
Clusters running on which of the following operating systems are supported for migration to Windows Server 2012? (Choose all that apply)
answer
Windows Server 2008, Windows Server 2008 R2 ***You can migrate clusters running Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012.
question
When configuring shared storage for a cluster, there are several requirements that you must keep in mind. Of the items listed here, which one is not a requirement when configuring the shared storage?
answer
The disks must be only GPT, not MBR. ***To use a shared disk, you must use the following guidelines: - For the disk type, use basic disks, not dynamic disks. - For the file system type, format the disk as New Technology File System (NTFS). - For the partition style of the disk, you can use either master boot record (MBR) or globally unique identifier (GUID) partition table (GPT). - The storage device must follow the SCSI Primary Commands-3 (SPC-3) standard including supporting Persistent Reservations. - The miniport driver used for the storage must work with the Storport storage driver. - A storage device can be assigned to only one cluster. This is usually accomplished with logical unit number (LUN) masking or zoning.
question
What name is given to the most basic and smallest configurable unit that may provide a service to clients in a cluster?
answer
Cluster resource ***A cluster resource is the most basic and smallest configurable unit that may provide a service to clients, or it is an important component that makes up the cluster.
question
When using iSCSI storage in a failover cluster, which of the items listed here becomes a recommended configuration?
answer
Each clustered server should have one or more network adapters or host bus adapters dedicated to the cluster storage ***If you use iSCSI storage connections, each clustered server should have one or more network adapters or host bus adapters dedicated to the cluster storage.
question
Why is it not recommended to install Active Directory Domain Services (AD DS) on cluster nodes?
answer
AD DS does not require clustering for fault tolerance ***It is not recommended that you install the Active Directory Domain Services (AD DS) role on any of the nodes. Having multiple domain controllers provides fault tolerance without using a cluster.
question
Which quorum type allows the cluster to continue to function as long as one node is available and the disks are online?
answer
No Majority (Disk Only) ***The No Majority (Disk Only) quorum type allows the cluster to function as long as one node is available and the disks are online. However, this configuration is not recommended, because the disk might be a single point of failure.
question
Which quorum type is recommended for clusters with an odd number of nodes?
answer
Node Majority ***The Node Majority quorum type is recommended for clusters with an odd number of nodes. It can sustain failures of half the nodes (rounding up) minus one.
question
Which quorum type is used by clusters that have special configurations?
answer
Node and File Share Majority ***The Node and File Share Majority quorum type is used for clusters with special configurations. Instead of using a disk witness, it uses a file share witness.
question
Which quorum type is recommended for clusters with an even number of nodes?
answer
Node and Disk Majority ***The Node and Disk Majority quorum type is recommended for clusters with an even number of nodes. It can sustain failures of half the nodes (rounding up) if the disk witness remains online.
question
Which of the following technologies transparently distributes traffic across multiple servers by using virtual IP addresses and a shared name?
answer
Network Load Balancing ***Network Load Balancing (NLB) transparently distributes traffic across multiple servers by using virtual IP addresses and a shared name. With NLB, you gain fault tolerance and enhanced performance. It is often used with mission-critical web servers but can also be found with other types of servers.
question
Which of the following statements about Network Load Balancing is incorrect?
answer
Network adapters in the NLB cluster can use both multicast and unicast simultaneously. ***Within each cluster, all network adapters must be either multicast or unicast. You cannot have some nodes configured as multicast while other nodes are configured as unicast within a single cluster.
question
From where would you add Network Load Balancing to a Windows Server 2012 computer?
answer
Server Manager ***To add the NLB feature to a computer running Windows Server 2012, you use Server Manager.
question
To configure an NLB cluster after installing NLB on the Windows Server 2012 computer, you must configure three types of parameters. Which of the following is not one of the three you must configure?
answer
Firewall rules ***To configure the NLB cluster, you must configure three types of parameters: - Host parameter: Defines what each node can do in an NLB cluster. - Cluster parameter: Configures the NLB cluster as a whole. - Port rules: Controls what ports the NLB cluster services and how requests are balanced across all servers.
question
Which PowerShell cmdlet here will correctly install NLB and the NLB management console?
answer
Add-WindowsFeature NLB,RSAT-NLB ***To install the NLB cluster and the NLB tools using PowerShell, you can use the following cmdlet: Add-WindowsFeature NLB,RSAT-NLB
question
Which PowerShell cmdlet is used to add a new dedicated IP to an NLB cluster node?
answer
Add-NlbClusterNodeDip ***You can use the Add-NlbClusterNodeDip cmdlet to add a dedicated IP to an NLB cluster node.
question
Which PowerShell cmdlet is used to delete an NLB cluster?
answer
Remove-NlbCluster ***You can use the Remove-NlbCluster cmdlet to delete a specified NLB cluster.
question
While logged into a Windows Server 2012 computer that is part of an NLB cluster, which of the following PowerShell one-liners is the correct way to change or set the primary IP address of the cluster?
answer
Get-NlbCluster | Set-NlbCluster -ClusterPrimaryIP IPaddress ***You would need to use the Get-NlbCluster | Set-NlbCluster -ClusterPrimaryIP IPaddress PowerShell one-liner to change or set the primary IP address of the cluster.
question
When you configure port rules for NLB clusters, you will need to configure all of the options listed here, except for one. Which option in this list will you not configure for a port rule?
answer
The node IP address the rule should apply to ***When you configure the port rules, you configure the following: - The virtual IP address that the rule should apply to - The TCP or UDP port range that this rule should apply to - The protocols that this rule should apply to, including TCP, UDP, or both - The filtering mode that specifies how the cluster handles traffic, which is described by the port range and the protocols
question
In which NLB cluster operation mode is the MAC address of every node's network adapter replaced with a single shared MAC address?
answer
Unicast ***When you configure an NLB cluster to use unicast mode, NLB replaces the network card's original MAC address, and all cluster hosts use the same unicast MAC address.
question
Which of the following is a constraint of using NLB clusters in unicast mode that you will need to design for?
answer
You will need separate cluster and management network adapters if you manage the nodes from a different TCP/IP subnet than the cluster network. ***When you use unicast mode with a single network adapter on each node, the computer can communicate only with other computers within the same subnet. If you perform management tasks on the computer, you need to perform these tasks on a computer that is on the same TCP/IP subnet as the node, or you have to use a second network adapter and address.
question
Which cluster operation mode is designed to prevent the network switch from flooding with traffic?
answer
IGMP Multicast ***Another mode available is the Internet Group Management Protocol Multicast mode, which is a special form of multicast mode that prevents the network switch from flooding with traffic. When you use IGMP multicast mode, traffic is forwarded only through the switch ports that are part of the NLB cluster.
question
Which NLB control command would be the correct one to use to gracefully prepare a node for a planned maintenance activity?
answer
Drainstop ***To perform maintenance on an NLB node that needs to be temporarily removed from the NLB cluster, you should choose drainstop so that connections are not prematurely stopped before the requests are completed.
question
Which NLB control command would most likely be the best option to use to immediately prepare a node for emergency maintenance?
answer
Stop ***The stop action terminates all existing connections to the cluster node and stops the NLB service. This would most likely be the best option if you needed to immediately take the server out of the NLB cluster for maintenance; although, it will result in client session interruption, so it should be used with caution and an understanding of the net result.
question
Many components can be configured redundantly within a server system. Of the components listed, which one is typically not available in a redundant arrangement in a single server system?
answer
Mainboards (motherboards) ***To make a server more fault tolerant, you should first look at what components are the most likely to fail and implement technology to make the system less likely to fail. Some of the components that are made redundant within a system are usually the following: - Disks: Use some form of RAID and hot spares. - Power supplies: Use redundant power supplies. - Network cards: Use redundant network cards.
question
Why should you clearly express availability requirements?
answer
To ensure there are no misunderstandings ***If there is miscommunication about service-level expectations between the customer and the IT department, poor business decisions, unsuitable investment levels, and customer dissatisfaction are likely to occur. Therefore, you need to express availability requirements clearly so that there are no misunderstandings about the implications.
question
What is the function of port rules in an NLB cluster?
answer
They define which ports are balanced among the hosts of the cluster ***Port rules define which incoming TCP/IP requests are balanced among the hosts in the NLB cluster.
question
When configuring a port rule for an NLB cluster with the "multiple host" filtering mode selected, which of the following statements is most correct pertaining to the affinity configuration?
answer
Selecting the "Single" option will force a single cluster node to handle all client requests from a specific client ***When you select the "Single" affinity option, a single cluster node handles all requests from a single client. This option is useful for stateful applications where the status of a process or transaction is maintained through the entire connection, including when using SSL and e-commerce shopping cart applications.
question
Which of the following availability guidelines allows for a maximum downtime per month of 25.9 seconds?
answer
Five nines (99.999%) ***The maximum allowable downtime for each "9" of availability is: - 99%β€”3.65 days per year, or 7.20 hours per month - 99.9% ("three nines")β€”8.76 hours per year, or 43.8 minutes per month - 99.99% ("four nines")β€”52.6 minutes per year, or 4.32 minutes per month - 99.999% ("five nines")β€”5.26 minutes per year, or 25.9 seconds per month - 99.9999% ("six nines")β€”31.5 seconds per year, or 2.59 seconds per month
question
Which of the following availability guidelines allows for a maximum downtime per year of 52.6 minutes?
answer
Four nines (99.99%) ***The maximum allowable downtime for each "9" of availability is: - 99%β€”3.65 days per year, or 7.20 hours per month - 99.9% ("three nines")β€”8.76 hours per year, or 43.8 minutes per month - 99.99% ("four nines")β€”52.6 minutes per year, or 4.32 minutes per month - 99.999% ("five nines")β€”5.26 minutes per year, or 25.9 seconds per month - 99.9999% ("six nines")β€”31.5 seconds per year, or 2.59 seconds per month
question
Which of the following availability guidelines allows for a maximum downtime per year of 31.5 seconds?
answer
Six nines (99.9999%) ***The maximum allowable downtime for each "9" of availability is: - 99%β€”3.65 days per year, or 7.20 hours per month - 99.9% ("three nines")β€”8.76 hours per year, or 43.8 minutes per month - 99.99% ("four nines")β€”52.6 minutes per year, or 4.32 minutes per month - 99.999% ("five nines")β€”5.26 minutes per year, or 25.9 seconds per month - 99.9999% ("six nines")β€”31.5 seconds per year, or 2.59 seconds per month
question
Which of the following availability guidelines allows for a maximum downtime per month of 43.8 minutes?
answer
Three nines (99.9%) ***The maximum allowable downtime for each "9" of availability is: - 99%β€”3.65 days per year, or 7.20 hours per month - 99.9% ("three nines")β€”8.76 hours per year, or 43.8 minutes per month - 99.99% ("four nines")β€”52.6 minutes per year, or 4.32 minutes per month - 99.999% ("five nines")β€”5.26 minutes per year, or 25.9 seconds per month - 99.9999% ("six nines")β€”31.5 seconds per year, or 2.59 seconds per month
question
The High Availability Wizard allows you to configure several pre-selected high availability roles in a cluster. Which of the following are options that are available to choose from? (Choose all that apply)
answer
Distributed Transaction Coordinator (DTC), Exchange Server ***The High Availability Wizard offers the following services and applications to choose from: DFS Namespace Server, DHCP Server, Distributed Transaction Coordinator (DTC), File Server, Generic Application, Generic Script, Generic Service, iSCSI Target Server, Internet Storage Name Service (iSNS) Server, Message Queuing, Other Server, Virtual Machine (VM), WINS Server.
question
Which of the following statements are true concerning SMB Multichannel in SMB 3.0? (Choose all that apply)
answer
Uses multiple network interfaces, Introduces bandwidth aggregation and network fault tolerance, SMB 1.0 and SMB 2.x clients will use a single SMB connection ***SMB Multichannel uses multiple network interfaces to provide both high performance through bandwidth aggregation and network fault tolerance through the use of multiple network paths to data on an SMB share. SMB 1.0 and SMB 2.x clients will use a single SMB connection.
question
What new management functionality is introduced with SMB 3.0?
answer
PowerShell cmdlets for SMB ***SMB PowerShell management cmdlets were introduced in Windows Server 2012 and in Windows 8 with SMB 3.0.
question
Which of the following features are not supported on the Scale-Out File Server? (Choose all that apply)
answer
DFS replication, File Server Resource Manager, NFS ***Unlike a General Use File Server cluster, the Scale-Out File Server cluster is an active-active failover cluster where all file shares are online on all nodes simultaneously. Although the Scale-Out File Server supports SMB, it does not support NFS, Data Deduplication, DFS Replication, or File Server Resource Manager.
question
How does the Scale-Out File Server provide for multiple nodes to access the same volume at the same time?
answer
CSV and CSV cache ***To support multiple nodes to access the same volume at the same time, the Scale-Out File Server uses a CSV. It also uses a CSV cache, which is a read cache that significantly improves performance in certain scenarios, such as Virtual Desktop Infrastructure.
question
When adding nodes to a cluster, what permission must be granted to the account used to add the nodes to the cluster if that account is not a member of the Domain Administrators security group?
answer
Create Computer Objects ***When you first create a cluster or add servers to a cluster, you must be logged on to the domain with an administrator's account on all the cluster's servers. If the account is not a domain administrator, the account must have the Create Computer Objects permission in the domain.
question
How do you change the value of the preferred node in a cluster?
answer
List the servers in the preferred order ***Select the server to be preferred from the list of available servers, then use the Up and Down buttons to move that server to the top or bottom of the listing.
question
What does the priority value for the cluster role specify?
answer
The order in which roles are started up ***If a cluster has multiple roles, you can categorize the priority for each role. Roles with higher priorities are started before roles with lower priorities. If you don't want a role to start, you select No Auto Start.
question
How does the selection of the preferred node affect failover of the cluster resources?
answer
Allows you to control which node the resources come online on after a failure ***When configuring the Failback option, you can specify when failback will occur and whether or not to failback to the preferred owner after the preferred owner is brought back online.
question
When configuring the failure threshold on the Failover tab, you can opt to leave the cluster in a failed state by configuring what two options? (Choose two answers)
answer
The maximum number of failures that can occur, The length of time in hours ***You will configure the maximum number of failures that can occur in the selected number of hours. If the cluster fails more times within the selected period of time, it can be configured to be left offline for manual intervention.
question
When using VM Monitoring for Hyper-V VMs, what event ID will be logged when a monitored service is deemed to be unhealthy?
answer
1250 ***When the service is determined to be unhealthy, the Event ID 1250 will be logged.
question
When using VM Monitoring for Hyper-V VMs, into what event log will events be logged when a monitored service is deemed to be unhealthy?
answer
System ***The events (event ID 1250) will be logged in the System log.
question
Which of the following PowerShell cmdlets correctly configures VM Monitoring for the DHCPClient service on the VM named VM42?
answer
Add-ClusterVMMonitoredItem -VirtualMachine "VM42" -Service DHCPClient ***You would correctly use the PowerShell cmdlet Add-ClusterVMMonitoredItem -VirtualMachine "VM42" -Service DHCPClient to configure this monitoring configuration.
question
If a monitored VM is gracefully restarted on its current Hyper-V host and it subsequently fails again, what will VM Monitoring next attempt?
answer
Move the VM to another cluster node and restart it again ***When the service is determined to be unhealthy, the Event ID 1250 will be shown in the System Log. VM Monitoring will then restart the VM gracefully on the host that it's currently running on. If the VM fails again, VM Monitoring will move the VM to another node and start the VM.
question
Which of the following features of the General Use File Server clustering role is the only change from Windows Server 2008 R2 to Windows Server 2012?
answer
Support for SMB 3.0 ***The General Use File Server role provides a central location for users to share files or for server applications that open and close files frequently. It also supports SMB, Network File System (NFS), Data Deduplication, File Server Resource Manager, DFS Replication, and other File Services role services. The only significant difference between Windows Server 2008 R2 and Windows Server 2012 is that Windows Server 2012 supports SMB 3.0.
question
When creating a new General Use File Server role, which SMB settings are enabled by default, but can be disabled if desired? (Choose all that apply)
answer
Enable continuous availability, Encrypt data access ***The Enable continuous availability and Encrypt data access options are selected by default. The Enable continuous availability takes advantage of SMB v3 functionality (Transparent Failover), whereas the Encrypt data access enables encryption of the SMB connections.
question
When configuring a cluster to provide highly available Hyper-V services, which of the following hardware requirements must your server hardware meet?
answer
Provide hardware-assisted virtualization ***Hosts require an x64-based processor with hardware-assisted virtualization.
question
Which SMB 3.0 feature minimizes processor utilization when performing large file I/O operations?
answer
SMB Direct ***SMB Direct (SMB over Remote Direct Memory Access [RDMA]) enables direct memory-to-memory data transfers between servers, with minimal CPU utilization and low latency, using standard RDMA-capable network adapters (iWARP, InfiniBand, and RoCE). It also minimizes the processor utilization when performing large file I/O operations.
question
Server Message Block (SMB) 3.0 provides many changes that add functionality and improve performance. Which of the following features allows SMB 3.0 clients to not lose an SMB session when failover occurs?
answer
SMB Transparent Failover ***SMB Transparent Failover provides Continuously Available properties that allow SMB 3 clients to not lose an SMB session when failover occurs. Both the SMB client and SMB server must support SMB 3.0 to take advantage of the SMB Transparent Failover functionality.
question
Server Message Block (SMB) 3.0 provides many changes that add functionality and improve performance. Which of the following features reduces the latency when accessing files over slow WAN links?
answer
SMB Directory Leasing ***SMB Directory Leasing reduces the latency when accessing files over slow WAN links by caching directory and file meta-data for longer periods, which reduces the associated round-trips to fetch the meta-data from the server.
question
Server Message Block (SMB) 3.0 provides many changes that add functionality and improve performance. Which of the following features allows users to scale shared bandwidth by adding cluster nodes?
answer
SMB Scale Out ***SMB Scale Out allows users to scale shared bandwidth by adding cluster nodes.
question
Server Message Block (SMB) 3.0 provides many changes that add functionality and improve performance. Which of the following features encrypts traffic?
answer
SMB Encryption ***SMB Encryption performs encryption by selecting a check box. Both the SMB client and SMB server must support SMB 3.0 to take advantage of the SMB Encryption functionality.
question
In regard to Live Migration, which of the following prerequisites must be met before attempting the Live Migration? (Choose all that apply)
answer
All hosts must use processors from the same manufacturer, All hosts must support hardware virtualization ***Additionally, the involved hosts must be running Windows Server 2012, must be in the same Active Directory domain (or trusting domains), the VMs must be using VMD or VMDX disks and you must have the required administrative permissions to perform the LM.
question
If you will be performing Live Migration using remote management tools, what must you first do to allow for Kerberos authentication to function?
answer
Configure Kerberos constrained delegation on the source server ***If you are using remote management tools, you need to configure constrained delegation and select Kerberos as the authentication protocol. You will perform the delegation on the source server, selecting services on the target server.
question
When performing a Live Migration, there are several options available to choose from that control how the LM will occur. Which of the following is not one of these options?
answer
Move only the snapshot files ***There is no option when performing a Live Migration to move only snapshot files.
question
When performing a Live Migration using the "Move the virtual machine's data by selecting where to move the items" option, you have three additional, advanced options available to you. Which of the following is not one of those advance options?
answer
Move the VM's data to different locations ***There is no option "Move the VM's data to different locations" in the advanced options available to you when using the "Move the virtual machine's data by selecting where to move the items" Live Migration option.
question
Quick Migration occurs within the confines of what?
answer
A failover cluster ***Quick Migration occurs within the confines of a cluster, allowing you to quickly migrate a running VM from one cluster node to another.
question
What two factors are the primary items impacting the speed of a Quick Migration? (Choose two answers)
answer
The speed of the network between the source and destination servers, The amount of memory that needs to be written to disk ***The speed of the Quick Migration is dependent on how much memory needs to be written to disk and the speed of the network connection between the source and destination servers.
question
When importing a VM in Windows Server 2012, you have three options available to select from that affect how the import is performed. Which of the following is not one of those options?
answer
Restore the virtual machine (create a new unique ID) ***There is no option available to "Restore the virtual machine (create a new unique ID)".
question
If you want to use an exported VM as a template to create multiple VMs, what should you do on the source VM before performing the export?
answer
Run sysprep ***If you want to use an exported VM as a template to create multiple VMs, you should run sysprep on the VM prior to performing the export.
question
You want to use Microsoft System Center Virtual Machine Manager 2012 SP1 in your network to allow you to perform P2V migrations. What operating system must you install on the server to house SCVMM?
answer
Windows Server 2012 only ***SCVMM SP1 runs only on Windows Server 2012
question
Which of the following VM file formats can be migrated using the V2V method by Microsoft System Center Virtual Machine Manager? (Choose all that apply)
answer
OVF, VMware, Citrix XenServer ***Currently, SCVMM supports migrations from VMware, XenServer, or OVF. You wouldn't migrate a VHD, you would export and import it instead.
question
Before you can work with OVF files on your SCVMM server, what must you first do?
answer
Apply the OVF Import/Export tool ***Open Virtualization Format (OVF) is an open standard for packaging and distributing virtual machines and needs the OVF Import/Export tool, which is available from the Microsoft Download Center. The OVF Import/Export tool must be installed into an existing VMM management server that has the VMM console installed.
question
When performing a P2V migration using SCVMM, there are several limitations that must be observed. Which of the following source server specifications would disqualify it from a P2V migration? (Choose all that apply)
answer
256 MB of RAM installed, Uses BitLocker Drive Encryption on the data volume ***Source servers to be migrated using P2V must have at least 512 MB of RAM and cannot have any encrypted volumes.
question
When performing a P2V migration using SCVMM, there are several limitations that must be observed. Which of the following source operating systems would be disqualified from a P2V migration?
answer
Windows Server 2003 SP1 32-bit ***VMM does not support P2V conversion for computers running NT Server 4.0 or Windows Server 2003 SP1.
question
What minimum version of VMware ESX/ESXi must a source VM be running on to allow it to be migrated to Hyper-V using P2V?
answer
3.5 update 5 ***The prerequisites for V2V using SCVMM are as follows: - VMware ESX/ESXi version 3.5 update 5 or higher (4.0, 4.1, or 5.1). - The VMware Tools must be removed. - VMware virtual hard disks cannot be connected to an IDE bus.
question
Offline P2V migrations are the only available migration method for what types of source servers? (Choose all that apply)
answer
Servers with FAT32 volumes, Servers that are domain controllers ***An offline P2V conversion is the only way to migrate FAT volumes and domain controllers.
question
When performing a Live Migration using the "Move the virtual machine's data by selecting where to move the items" option, which of the following advanced options would be the best to choose from to ensure that the folder structure remains the same on the destination server after the LM completes?
answer
Move the VM's data automatically ***The "Move the VM's data automatically" option maintains the file and folder structure of the source on the destination.
question
When performing a Live Migration using the "Move the virtual machine's data by selecting where to move the items" option, which of the following advanced options would be the best to choose from if you need to select a specific location on the destination server for each of the VMs to be moved to?
answer
Move the VM's hard disks to different locations ***The "Move the VM's items to different locations" option allows you to specify the location of each moving item.
question
When performing a VM import operation, which option is best selected when you are working from an exported VM template that you will be importing more than once?
answer
Copy the virtual machine (create a new unique ID) ***The "Copy the virtual machine (create a new unique ID)" option is used when you have an exported VM that you are using as a template and want to import many times.
question
What is the process by which you move the storage of a VM from one physical server to another without a cluster?
answer
Storage Migration ***Storage Migration is the process of moving the storage of a VM from one physical server to another without a cluster.
question
What is the process by which you move an entire VM or parts of a VM to another physical server using a cluster?
answer
Quick Migration ***Quick Migration is the process of moving an entire VM or parts of a VM to another physical server using a cluster.
question
What is the process by which you take a partially or completely configured VM and create other VMs without having to perform the installation and configuration from scratch?
answer
Exporting ***Exporting a VM is the process by which you take a partially or completely configured VM and create other VMs without having to perform the installation and configuration from scratch.
question
What is the process by which you move an entire VM or parts of a VM to another physical server without a cluster?
answer
Live Migration ***Live Migration is the process of moving an entire VM or parts of a VM to another physical server without a cluster.
question
Which of the following is a distributed file system protocol used to access files over the network that is used with UNIX and Linux file server clients?
answer
NFS ***Network File System (NFS) is a distributed file system protocol that is used to access files over a network, similar to accessing a file using a shared folder in Windows (which uses Server Message Block (SMB). It is used with UNIX and Linux file server clients and VMware.
question
What feature of Windows enables you to integrate Windows users into an existing UNIX or Linux environment?
answer
Identity Management for UNIX ***Identity Management for UNIX enables you to integrate Windows users into an existing UNIX or Linux environment, including managing user accounts and passwords on Windows and UNIX systems.
question
What feature or role must you install to extend the Active Directory schema with UNIX attributes?
answer
Server for NFS ***When you install the Server for NFS role, it extends the Active Directory schema by adding UNIX attributes.
question
When configuring UNIX Attributes for an Active Directory user account, which of the following attributes is not available for configuration?
answer
Login script ***You can configure the following UNIX attributes: NIS domain, UID, login shell, Home directory, and Primary group.
question
Which of the following protocols is not supported by BranchCache?
answer
NFS ***BranchCache supports HTTP/HTTPS, SMB and BITS.
question
Which mode of BranchCache configuration uses one or more dedicated servers to provide the cached copy in the branch office?
answer
Hosted cache mode ***The hosted cache mode uses one or more dedicated servers to host the cache.
question
Distributed cache mode is designed for branch offices with what number of clients?
answer
Fewer than 50 ***Distributed cache mode is designed for branch offices with fewer than 50 users that do not have a dedicated server in the branch office. BranchCache works across a single subnet only.
question
Before you can use BranchCache, you must perform several tasks. Which of the following tasks is not required to be performed to use BranchCache?
answer
Configure switches to support BranchCache ***You will not need to make any changes to your network infrastructure (switches, routers) to support BranchCache.
question
When configuring the BranchCache hash publication options in Group Policy, you have three options available. Which of the options listed here is not available to configure?
answer
Disallow hash publication on shared folders on which BranchCache is not enabled ***There is no Group Policy option for BranchCache hash publication to "Disallow hash publication on shared folders on which BranchCache is not enabled."
question
What can you use to configure automatic procedures for defining a desired property on a file based on the conditions specified in a rule?
answer
File classification ***File classification allows you to configure automatic procedures for defining a desired property on a file, based on the conditions specified in classification rules. Once the classification has been made, however, you can then do many other things such as deleting files, archiving files, or other automated tasks.
question
Before you can audit access to files, what must you first do? (Choose all that apply)
answer
Specify files to be audited, Enable object access auditing ***When you want to audit files, you must first enable object access auditing. Then you must specify what files you want to audit.
question
When configuring file access auditing, which of the following audit types are available to choose from?
answer
Success, Fail, All ***You will need to select Success, Fail, or the All type when configuring what type of actions to perform auditing on.
question
What feature, first available in Windows 7 and Windows Server 2008, enables you to configure object access auditing for every file and folder on the computer's file system?
answer
Global Object Access Auditing ***Starting with Windows 7 and Windows Server 2008 R2, you can enable Global Object Access Auditing, which enables you to configure object access auditing for every file and folder in a computer's file system.
question
What can be configured to create targeted audit policies based on resource properties, and expressions, so that you don't have to audit every file?
answer
Dynamic Access Control ***You can use Dynamic Access Control to create targeted audit policies based on resource properties, and expressions, so that you don't have to audit every file.
question
How is Identity Management for UNIX installed?
answer
Using dism.exe ***You must install the Identity Management for UNIX using the Deployment Image Servicing and management command-line tool, dism.exe.
question
When a file is accessed using NFS, what attributes are used by the NFS server to determine if the user has the required permissions to access the file?
answer
UID and GID ***Users are identified with a user identifier (UID) value and a group identifier (GID). Whenever a file is accessed using NFS, the UID and GID are sent to the NFS server to see whether the user has the proper permissions for access.
question
To create an NFS shared folder on a cluster, you need to install which of the following items on each cluster node?
answer
The File Services role, The Server for NFS role service, The Failover Clustering feature ***After you install all three prerequisites and create a cluster, you can configure the cluster to provide high availability for NFS and create an NFS share.
question
Which of the following terms is best described as giving access to a user?
answer
Authorization ***Authentication is used to prove the identity of a user. Authorization gives access to the user who was authenticated.
question
Select the proper PowerShell cmdlet from this list that is used to configure BranchCache in local caching mode.
answer
Enable-BCLocal ***You will use the Enable-BCLocal cmdlet to configure BranchCache in local caching mode.
question
Select the proper PowerShell cmdlet from this list that is used to modify BranchCache configuration.
answer
Set-BCCache ***You will use the Set-BCCache cmdlet to modify BranchCache configuration.
question
Select the proper PowerShell cmdlet from this list that is used to increase the BranchCache in storage space.
answer
Add-BCDataCacheExtension ***You will use the Add-BCDataCacheExtension cmdlet to increase the BranchCache storage space.
question
Select the proper PowerShell cmdlet from this list that is used to configure BranchCache in distributed caching mode.
answer
Enable-BCDistributed ***You will use the Enable-BCDistributed cmdlet to configure BranchCache on a computer in distributed caching mode.