1.
Your network contains an Active Directory domain named contoso.com. The domain contains four servers on a test network. The servers are configured as shown in the following table. Server1 uses the storage shown in the following table. You perform the following tasks:
- On Server2, you create an advanced SMB share named Share2A and an applications SMB share named Share2B.
- On Server3, you create an advanced SMB share named Share3.
- On Server4, you create an applications SMB share named Share4.
You add Server3 and Server4 to a new failover cluster named Clus1. On Clus1, you configure the File Server for general use role, you create a quick SMB share named Share5A, and then you create an applications SMB share named Share5B. You plan to create a failover cluster of two virtual machines hosted on Server1. The clustered virtual machines will use shared .vhdx files. You need to recommend a location to store the shared .vhdx files. Where should you recommend placing the virtual hard disk (VHD)?
2.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment. The domain contains six servers. The servers are configured as shown in the following table. You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2. You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. You need to back up the VMM encryption key. What should you back up?
3.
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM). You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node. What should you do?
4.
Your Active Directory currently contains five virtualized domain controllers that run Windows Server 2012 R2. The system state of each domain controller is backed up daily. The backups are shipped to a remote location weekly. Your company recently implemented a disaster recovery site that contains several servers. The servers run Windows Server 2012 R2 and have the Hyper-V server role installed. The disaster recovery site has a high-speed WAN link to the main office. You need to create an Active Directory recovery plan that meets the following requirements:
- Restores the Active Directory if a catastrophe prevents all access to the main office.
- Minimizes data loss.
What should you include in the plan?
5.
Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder. You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2. Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN). You plan to move the shared folder to Cluster1. You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1. What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
6.
Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines. Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter. Does this meet the goal?
7.
Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines. Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new external virtual network switches. Does this meet the goal?
8.
Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines. Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches. Does this meet the goal?
9.
Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines. Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2. Does this meet the goal?
10.
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline. Does this meet the goal?