getcertified4sure.com

The Leading Guide To 74-409 Q&A Sep 2021




Proper study guides for Up to the minute Microsoft Server Virtualization with Windows Server Hyper-V and System Center certified begins with Microsoft 74-409 preparation products which designed to deliver the Downloadable 74-409 questions by making you pass the 74-409 test at your first time. Try the free 74-409 demo right now.

Q51. A company has a Hyper-V failover cluster that consists of sixteen host servers that run Windows Server 2012 R2. The company uses System Center 2012 R2 Virtual Machine Manager (VMM) to manage the Hyper-V environment. 

Eight of the host servers are used only for engineering-related services. The other eight host servers are used for general corporate use. 

You need to ensure that the corporate virtual machines (VMs) are never moved to the host servers that are used for engineering. 

What should you do? 

A. Create a new VMM availability set for the corporate VMs. 

B. Create a custom property for the corporate VMs and host servers. Then, use a custom placement rule for the host group. Specify that the rule must match. 

C. In the corporate VMs, set the value of the Preferred Owners setting to the names of the corporate host servers. 

D. Create a new VMM availability set for the corporate host servers. 

Answer:

Explanation: Ref: http://blogs.technet.com/b/scvmm/archive/2013/03/11/custom-placement-rules-and-availability-sets-in-scvmm-2012-sp1.aspx 


Q52. You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. You plan to test an update to a virtual machine (VM) in a production environment. You must meet the following requirements: 

.. 

migrate the VM to another Hyper-V host as quickly as possible ensure that the VM configuration is preserved after the migration is complete 

You need to migrate the virtual machine. What should you do first? 

A. Create a checkpoint of the VM. 

B. Run the Windows PowerShell cmdlet Export-VMSnapshot. 

C. Run the Windows PowerShell cmdlet New-VirtualDiskClone. 

D. Export the VM. 

Answer:

Explanation: 

Ref: http://www.robertborges.us/2013/10/windows/windows-server-2012/importing-exporting-hyper-v-virtual-machines-in-windows-server-2012-r2/ 

This is the way to preserve the configuration after the migration on both of the hosts – the “source” host will keep the powered off state of the VM and on the “destination” host will run the “migrated” VM. 


Q53. An organization has private and public cloud resources. The organization has Windows Server 2012 R2 servers that have the Hyper-V roll installed. You have one four-node cluster of Hyper-V host servers. You use System Center 2012 R2. 

The virtual machines that run on the cluster must remain online when you install updates on the Hyper-V host servers. 

You need to install updates on the Hyper-V host servers. 

What should you do? 

A. Configure Windows Server Update Services (WSUS) to provide updates to the virtual machines hosted on the cluster. 

B. Add all the servers to a collection in System Center 2012 R2 Configuration Manager. Deploy updates to the collection. 

C. Create orchestrated updates of Hyper-V host clusters by using System Center 2012 R2 Virtual Machine Manager (VMM). 

D. Configure Windows Update on the Hyper-V host servers to download updates from Microsoft Update. 

Answer:

Explanation: 

Ref: http://technet.microsoft.com/en-us/library/gg675084.aspx 

http://technet.microsoft.com/en-us/library/gg675088.aspx VMM rolls through the host cluster, remediating one cluster node at a time. If a cluster node is compliant, VMM bypasses that node. 


Q54. OTSPOT 

A company has a single Active Directory Domain Services (AD DS) domain and four Windows Server 2012 R2 servers that have the Hyper-V role installed. The company uses System Center 2012 R2 Virtual Machine Manager (VMM) to manage the Hyper-V environment. One set of Hyper-v host servers is dedicated for use by the development environment. A second set of Hyper-v host servers is dedicated for use by the production environment. 

The network architects assign the IP address subnets as shown in the following table: The network architects also prepare a network design for the Hyper-V environments as shown in the Network Design exhibit. (Click the Exhibit button.) 

The implementation team reports a problem with IP addressing as shown in the Network Error exhibit. (Click the Exhibit button.) 

You need to ensure that the implementation team can implement the network design successfully. 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. 

Answer: 

33. RAG DROP 

You have a Windows Server 2012 R2 server that has the Hyper-V role installed. 

The company has the following requirements for the Hyper-V host server: 

. Virtual machines (VMs) must only communicate with other VMs and the Hyper-V host server. . You must be able to monitor all TCP/IP packets to and from VMs from the moment that VMs are able to communicate. . You must support a third-party program that uses the Network Driver Interface Specification (NDIS) API to monitor the TCP/IP packets between VMs. 

You need to configure the environment. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q55. You are the virtualization administrator for an organization. The organization uses all components of System Center 2012 R2 in the production environment. A power supply in a Hyper-v host server fails. The host server continues to run and host virtual machines in this degraded state. 

You have the following requirements: 

. Move virtual machines from host servers that are running in a degraded state to another host server. . Prevent placement of new virtual machines on degraded host servers. 

You need to configure the environment. 

Which System Center feature should you implement? 

A. Dynamic Optimization 

B. Performance and Resource Optimization (PRO) 

C. Shared VHDX files 

D. Placement Rules 

Answer:

Explanation: Ref: http://technet.microsoft.com/en-us/gg552992.aspx 

What is Performance and Resource Optimization (PRO)? PRO helps ensure that virtual machine hosts and virtual machines are operating in the most efficient possible manner. PRO generates recommendations for remedial actions based on alerts that Operations Manager generates. You can configure PRO to implement the preconfigured corrective actions automatically. 


Q56. You plan to use a Hyper-V host server to host virtual desktops for external customers. 

You have the following requirements: 

Individual virtual machines (VMs) must be isolated from one another. 

VMs must have access to the Internet. 

IP addresses should be used in the most efficient manner possible. 

The configuration must minimize administrative effort and management 

.... 

complexity. 

You need to configure the virtual environment. 

What should you do? 

A. Configure a port virtual local area network (PVLAN). Connect all new VMs to the PVLAN. 

B. Configure virtual networking with network isolation. Create a unique VM network for each VM. 

C. Deploy VMs to the same VM network. Enable DHCP Guard and Router Guard network extensions. 

D. Configure a virtual network with no isolation. Deploy VMs to the same VM network. Configure Windows firewall on each VM to prevent the VM from communicating with other VMs on the same VM network. 

Answer:

Explanation: 

PVLAN can be used to create an environment where VMs may only interact with the Internet and not have visibility into other VMs’ network traffic. To accomplish this put all VMs (actually their Hyper-V switch ports) into the same PVLAN in isolated mode. Therefore, using only two VLAN IDs, primary and secondary, all VMs are isolated from each other. 

Ref: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_pvlan 


Q57. OTSPOT 

A company has a Hyper-V environment that includes three servers named HOST1, HOST 2, and FILESERVER1. HOST1 and HOST2 run Windows Server 2012 R2 that have the Hyper-V role installed. FILESERVER1 runs Windows Server 2008 R2 and has the File Services role installed. All of the hardware supports Offloaded Data Transfer (ODX). 

The servers are configured as shown in the following diagram: 

STORAGE1 is encrypted with BitLocker. 

You need to support ODX for all of the virtual machines on HOST1. 

Use the drop-down menus to complete each statement based on the information presented 

in the screenshot. Each correct selection is worth one point. 

Answer: 


Q58. You have a Windows Server 2012 R2 Hyper-V environment that includes System Center 2012 R2 Virtual Machine Manager (VMM). The environment includes five physical servers. The servers are configured as follows: 

You plan to use VMM to migrate physical machines to virtual machines. 

You must migrate all servers that support physical to virtual (P2V) migration. 

You need to migrate the servers. 

Which three servers should you migrate? Each correct answer presents part of the 

solution. 

A. NYC-WEB 

B. NYC-PR 

C. NYC-DEV 

D. NYC-FS 

E. NYC-EX 

Answer: A,B,C 

Explanation: The source computer cannot have any volumes larger than 2040 GB. This disqualifies NYC-FS( not D) and NYC-EX (not E). 

Note: 

* Requirements on the Source Machine 

To perform a P2V conversion, your source computer: 

/Must have at least 512 MB of RAM. 

/ Cannot have any volumes larger than 2040 GB. 

/ Must have an Advanced Configuration and Power Interface (ACPI) BIOS – Vista WinPE will not install on a non-ACPI BIOS. 

/ Must be accessible by VMM and by the host computer. 

/ Cannot be in a perimeter network. A perimeter network, which is also known as a screened subnet, is a collection of devices and subnets placed between an intranet and the Internet to help protect the intranet from unauthorized Internet users. The source computer for a P2V conversion can be in any other network topology in which the VMM server can connect to the source machine to temporarily install an agent and can make Windows Management Instrumentation (WMI) calls to the source computer.