Your network contains four clusters. The clusters are configured as shown in the following table. You manage all of the clusters by using Microsoft System Center 2012 Virtual Machine Manager (VMM). You plan to implement Dynamic Optimization for the virtual machines. You need to recommend a configuration for the planned implementation. What should you recommend?
Your network contains two servers that run Windows Server 2012 R2. The servers are members of a failover cluster. Each server has 32 GB of RAM and has the Hyper-V server role installed. Each server hosts three highly available virtual machines. All of the virtual machines have an application named App1 installed. Each of the virtual machines is configured to have 4 GB of memory. During regular business hours, the virtual machines use less than 2 GB of memory. Each night, App1 truncates its logs and uses almost 4 GB of memory. You plan to add another three virtual machines to each host. The new virtual machines will run the same load as the existing virtual machines. You need to ensure that all of the virtual machines can run on one of the Hyper-V hosts if a single host fails. What should you do?
Your network contains an Active Directory domain named contoso.com. The domain contains Server 2012 R2 and has the Hyper-V server role installed. You need to log the amount of system resources used by each virtual machine. What should you do?
You have a server named Server1 that runs Windows Server 2012 R2. You plan to enable Hyper-V Network Virtualization on Server1. You need to install the Windows Network Virtualization Filter Driver on Server1. Which Windows PowerShell cmdlet should you run?
Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. You install the Network Load Balancing feature on VM1 and VM2. You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). Which virtual machine settings should you configure on VM1 and VM2?
Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file server that contains 3 TB of free disk space. HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:\VM and the virtual hard disk file is stored in E:\VHD. You plan to replace drive E with a larger volume. You need to ensure that VM1 remains available from HV1 while drive E is being replaced. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual machines that run Windows Server 2012 R2. Your company uses smart cards for authentication. You need to ensure that you can use smart card authentication when you connect to the virtual machine by using Virtual Machine Connection. What should you configure?
885CB989129A5F974833949052CFB2F2
Your network contains an Active Directory domain named adatum.com. The domain contains a server named ADFS1.
You plan to deploy Active Directory Federation Services (AD FS) to ADFS1.
You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users.
You need to identify which certificate or certificates are required for the planned deployment.
Which two certificates should you identify? (Each correct answer presents a complete solution.)
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases. Solution: You create a custom placement rule and apply it to all business-critical VMs. Does this meet the goal?
You have a properly configured certification authority in an Active Directory Domain Services domain. You must implement two-factor authentication and use virtual smart cards to secure user sessions. You need to implement two-factor authentication for each client device. What should you install on each client device?