Академический Документы
Профессиональный Документы
Культура Документы
NOTE:
Remember YES/NO are 12++ Question in MIX & also In every case study
there are 2 each YES/NO Question.
Key to Success is Master them before you Hit The Exam ...!!!!
QUESTION 1
NOTE: Once you answer this question, you will NOT be able to return to it.
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine
Manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
(VMs) that host business-critical SQL Server databases.
Solution: You configure preferred and possible owners for each businesscritical VM.
Does this meet the goal?
B. No
----------------------------------------------------
QUESTION 2
NOTE: Once you answer this question, you will NOT be able to return to it.
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine
Manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
(VMs) that host business-critical SQL Server databases.
Solution: You set the memory-weight threshold value to High for each
business-critical VM.
----------------------------------------------------
QUESTION 3
NOTE: Once you answer this question, you will NOT be able to return to it.
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine
Manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
(VMs) that host business-critical SQL Server databases.
Solution: You create an availability set and place each business-critical VM in
the set.
Does this meet the goal?
B. No
----------------------------------------------------
QUESTION 5
NOTE: Once you answer this question, you will NOT be able to return to it.
You manage a Hyper-V 2012 cluster by using system center Virtual machine
manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
(VMs) that host business-critical SQL server databases.
Solutions: You create a custom placement rule and apply it to all businesscritical VMs.
Does this meet the goal?
B. NO
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
You plan to allow users to run internal applications from outside the
company's network.
You have a Windows Server 2012 R2 that has the Active Directory Federation
Services (AD FS) role installed.
You must secure on-premises resources by using multi-factor authentication
(MFA).
You need to design a solution to enforce different access levels for users with
personal Windows 8.1 or iOS 8 devices.
Solution:You migrate the AD FS server to Microsoft Azure and connect it to the
internal Active Directory instance on the network.
Then, you use the Workplace Join process to configure access for personal
devices to the on-premises resources.
Does this meet the goal?
A. Yes
----------------------------------------------------
You plan to allow users to run internal applications from outside the
company's network.
You have a Windows Server 2012 R2 that has the Active Directory Federation
Services (AD FS) role installed.
----------------------------------------------------
You plan to allow users to run internal applications from outside the
company's network.
You have a Windows Server 2012 R2 that has the Active Directory Federation
Services (AD FS) role installed.
You must secure on-premises resources by using multi-factor authentication
(MFA).
You need to design a solution to enforce different access levels for users with
personal Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of MFA Server and connect it your
Microsoft Azure MFA provider.
Then, you use the Workplace Join process to configure access for personal
devices to the on-premises resources.
Does this meet the goal?
A. Yes
----------------------------------------------------
RMS) cluster named RMS1 to protect content for a project. You uninstall AD
RMS when the project is complete. You need to ensure that the protected
content is still available after AD RMS is uninstalled. Solution: You run the
following command from an administrative command prompt: Chiper /a/d/s:
<. >
A. NO
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
----------------------------------------------------
QUESTION
NOTE: Once you answer this question, you will NOT be able to return to it.
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine
Manager 2012 SP1. You need to ensure high availability for business-critical
virtual machines (VMs) that host business-critical SQL Server databases.
Solution: You configure preferred and possible owners for each businesscritical VM.
No
--------------------------QUESTION
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine
Manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
(VMs) that host business-critical SQL Server databases.
Solution: You set the memory-weight threshold value to High for each
business-critical VM.
--------------------------QUESTION
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine
Manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
(VMs) that host business-critical SQL Server databases.
--------------------------QUESTION
You manage a Hyper-V 2012 cluster by using system center Virtual machine
manager 2012 SP1.
You need to ensure high availability for business-critical virtual machines
Solutions: You create a custom placement rule and apply it to all businesscritical VMs.
NO
---------------------------
QUESTION
Solution: From Virtual Machine Manager (VMM), you modify the properties of
the service template.
No
---------------------------
QUESTION
Service1 contains two virtual machines. The virtual machines are configured
as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator
can review the availability information of Service1.
---------------------------
QUESTION
--------------------------QUESTION
Your network contains an Active Directory domain named contoso.com. The
domain contains a Microsoft System Center 2012 infrastructure. You deploy a
service named Service1 by using a service template. Service1 contains two
virtual machines. The virtual machines are configured as shown in the
A. Yes
---------------------------
QUESTION
You plan to allow users to run internal applications from outside the
companys network. You have a Windows Server 2012 R2 that has the Active
Directory Federation Services (AD FS) role installed. You must secure onpremises resources by using multi-factor authentication (MFA).
You need to design a solution to enforce different access levels for users with
personal Windows 8.1 or iOS 8 devices.
A. Yes
----------------------------------------QUESTION
You plan to allow users to run internal applications from outside the
companys network. You have a Windows Server 2012 R2 that has the Active
Directory Federation Services (AD FS) role installed. You must secure onpremises resources by using multi-factor authentication (MFA).
You need to design a solution to enforce different access levels for users with
personal Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of the MFA Server. You connect the
instance to the Microsoft Azure MFA provider and then you use Microsoft
Intune to manage personal devices.
A. Yes
----------------------------------------QUESTION
You plan to allow users to run internal applications from outside the
companys network. You have a Windows Server 2012 R2 that has the Active
Directory Federation Services (AD FS) role installed. You must secure onpremises resources by using multi-factor authentication (MFA). You need to
design a solution to enforce different access levels for users with personal
Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of MFA Server and connect it your
Microsoft Azure MFA provider. Then, you use the Workplace Join process to
configure access for personal devices to the on-premises resources.
Yes
----------------------------------------QUESTION
An organization uses an Active Directory Rights Management Services (AD
RMS) cluster named RMS1 to protect content for a project. You uninstall AD
RMS when the project is complete.
You need to ensure that the protected content is still available after AD RMS
is uninstalled.
Solution: You run the following Windows PowerShell command:
cipher/a/d/s:
B. No
-----------------------------------------
QUESTION
Solution: You add the backup service account to the SuperUsers group and
back up the protected content. Then, you restore the content to a file server
and apply the required NTFS permissions to the files.
B. No
-----------------------------------------
QUESTION
B. YES
-----------------------------------------
QUESTION
Your network contains five servers that run Windows Server 2012 R2. You
install the Hyper-V server role on the servers. You create an external virtual
network switch on each server. You plan to deploy five virtual machines to
each Hyper-V server. Each virtual machine will have a virtual network adapter
that is connected to the external virtual network switch and that has a VLAN
identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of
the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual
machine and join each virtual machine to an NLB cluster. The cluster will be
configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all
of the virtual machines.
Solution: From the properties of each virtual machine, you enable MAC
address spoofing for the existing virtual network adapter.
A. Yes
---------------------------------QUESTION
Your network contains five servers that run Windows Server 2012 R2. You
install the Hyper-V server role on the servers. You create an external virtual
network switch on each server. You plan to deploy five virtual machines to
each Hyper-V server. Each virtual machine will have a virtual network adapter
that is connected to the external virtual network switch and that has a VLAN
identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of
the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual
machine and join each virtual machine to an NLB cluster. The cluster will be
configured to use unicast only. You need to ensure that the NLB feature can
distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new external virtual network
switch. From the properties of each virtual machine, you add a second virtual
network adapter and connect the new virtual network adapters to the new
external virtual network switches.
B. No
---------------------------------QUESTION
Your network contains five servers that run Windows Server 2012 R2. You
install the Hyper-V server role on the servers. You create an external virtual
network switch on each server. You plan to deploy five virtual machines to
each Hyper-V server. Each virtual machine will have a virtual network adapter
that is connected to the external virtual network switch and that has a VLAN
identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of
the virtual machines will run the identical web application. You plan to install
the Network Load Balancing (NLB) feature on each virtual machine and join
each virtual machine to an NLB cluster. The cluster will be configured to use
unicast only.
You need to ensure that the NLB feature can distribute connections across all
of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network
switch. From the properties of each virtual machine, you add a second virtual
network adapter and connect the new virtual network adapters to the new
private virtual network switches.
No
----------------------------------
QUESTION
Your network contains five servers that run Windows Server 2012 R2. You
install the Hyper-V server role on the servers. You create an external virtual
network switch on each server. You plan to deploy five virtual machines to
each Hyper-V server. Each virtual machine will have a virtual network adapter
that is connected to the external virtual network switch and that has a VLAN
identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of
the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual
machine and join each virtual machine to an NLB cluster. The cluster will be
configured to use unicast only. You need to ensure that the NLB feature can
distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second
virtual network adapter. You connect the new virtual network adapters to the
external virtual network switch and configure the new virtual network
adapters to use a VLAN identifier of 2.
No
----------------------------------
QUESTION
Your network contains an Active Directory domain named contoso.com. The
network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Solution: You create a copy of the Basic EFS certificate template, and then
you modify the validity period of the copy.
Yes
----------------------------------
QUESTION
Your network contains an Active Directory domain named contoso.com. The
network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Solution: From the properties of the Basic EFS template, you assign the Allow
-Enroll permission to the Authenticated Users group.
No
----------------------------------
QUESTION
Your network contains an Active Directory domain named contoso.com. The
network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Solution: You create a copy of the User certificate template, and then you
modify the extensions of the copy.
B. No
----------------------------------
QUESTION
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS)
infrastructure. You need to issue a certificate to users to meet the following
requirements:
Solution: From the properties of the User certificate template, you assign the
Allow -Enroll permission to the Authenticated Users group.
No
----------------------------------
Solution: You create a recovery task in SCOM and configure it to start the
World Wide Web publishing service.
Does this meet the goal?
Yes
--------------------------Q
Solution: You create a diagnostic task in SCOM and configure it to start the
Server service.
Does this meet the goal?
No
----------------------------------
NO
----------------------------------------------