Actualtests offers free demo for 74-409 exam. "Server Virtualization with Windows Server Hyper-V and System Center", also known as 74-409 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 74-409 exam, will help you answer those questions. The 74-409 Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 74-409 exams and revised by experts!
Q21. OTSPOT
You plan to implement guest clustering that contains two virtual machines (VMs). You review the following information from one of the VMs:
.
The Validate File System test results in the Failover Clustering Validation Report, as shown in the Validation Report exhibit (Click the Exhibit button.)
.
The Features page of the Add Roles and Features Wizard, as shown in the Features Wizard exhibit (Click the Exhibit button.)
.
The disk management settings, as shown in the Disk Management exhibit (Click the Exhibit button.)
You need to ensure that you can implement guest clustering.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Q22. You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. The server hosts three virtual machines (VMs).
One of the VMs is managed by a security engineer. The security engineer must capture traffic on another VM that is running on the same server.
You need to ensure that the security engineer can access the network traffic information from the target VM.
Which networking feature should you enable?
A. port mirroring
B. NIC teaming
C. Protected network
D. MAC address spoofing
Answer: A
Explanation:
Ref: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror
Port Mirroring With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring - an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic.
The following examples configure port mirroring so that all traffic that is sent and received by both MyVM and MyVM2 is also sent to the VM named MonitorVM.
C:\Documents and Settings\Adnan Hameed\Desktop\untitled.PNG
Q23. You administer four servers that run Windows Server 2012 R2. The servers are part of a four-node Hyper-V cluster. You also have a file server cluster. All four Hyper-V nodes and the file server cluster have access to a storage area network (SAN) that is administered by a SAN administrator.
You have the following requirements:
. The SAN administrator must retain control over which servers have access to the SAN logical unit numbers (LUNs). . The SAN administrator must be able to control the zoning for the SAN environment at the individual guest virtual machine level.
You need to create the virtualized storage environment.
What should you do?
A. Implement virtual Fibre Channel adapters by using direct LUNs.
B. Create Cluster Shared Volumes (CSVs) by using shared .vhdx files.
C. Create Cluster Shared Volumes (CSVs) by using pass-through disks.
D. Scale out the file server by using Server Message Block (SMB) 3.0.
Answer: A
Explanation:
Ref: http://cloudtidings.com/2012/09/24/windows-2012-hyper-v-guest-fiber-channel-architecture/
Q24. A company uses Windows Server 2012 R2 servers that have the Hyper-V role installed. The company uses a single System Center 2012 R2 Data Protection Manager (DPM) server to back up and recover the Hyper-V environment.
You deploy a new standalone Hyper-V host server, and then deploy 20 new virtual machines (VMs) to the host server. You create a DPM protection group named ProtectionGroup3.
You need to automate the process of adding the 20 new VMs to ProtectionGroup3.
What should you run?
A. the Windows PowerShell cmdlet Register-SCVMMManagedComputer
B. the Windows PowerShell cmdlet Update-SCVMMManagedComputer
C. the Windows PowerShell script AddNewStandAloneVM.ps1, and specify the Hyper-V server and ProtectionGroup3 as parameters
D. the Windows PowerShell script AddNewStandAloneVMToDRServer.ps1, and specify the Hyper-V server and ProtectionGroup3 as parameters
Answer: C
Explanation: The.AddNewStandAloneVM.ps1.script does the following:
. .. ..
Takes the fully qualified domain name (FQDN) of the protected server and the
name of the protection group as input.
Searches for the protected server and the protection group.
Runs an inquiry on the server that is running Hyper-V and obtains the list of
unprotected virtual machines.
Adds this list of virtual machines to the protection group.
Saves the changes to the protection group and exits the procedure.
Ref: http://technet.microsoft.com/en-us/library/jj721498.aspx#bkmk_autoaddvm
Q25. A company has a highly-secure network infrastructure environment. All servers in the environment run Windows Server 2012 R2.
You must create a new virtual machine (VM) that meets the following requirements:
. The VM must minimize the risk that unauthorized firmware will run when the VM starts.
. The VM must load the operating system only if all operating system files have a valid signature.
You need to create the new VM. What should you do?
A. Create a Generation 2 VM and disable Secure Boot.
B. Create a Generation 1 VM and use a synthetic network adapter.
C. Create a Generation 1 VM and enable Secure Boot.
D. Create a Generation 2 VM with the default settings.
Answer: D
Explanation: Ref: http://technet.microsoft.com/en-us/library/dn282285.aspx
Secure Boot is a feature that helps prevent unauthorized firmware, operating systems, or UEFI drivers (also known as option ROMs) from running at boot time.
Note Secure Boot is enabled by default for generation 2 virtual machines. This can be modified after the virtual machine has been created.
Q26. A Windows Server 2012 R2 Hyper-V host server has four network adapters that are connected to two different network switches. The server contains a virtual machine named NYC-WEB.
You have the following requirements:
. increase the available bandwidth for NYC-WEB . implement network fault tolerance for NYC-WEB without modifying network switch configurations . use the least amount of administrative effort
You need to configure the Hyper-V environment. What should you do first?
A. Enable NIC teaming. Configure the team to use Static Teaming mode.
B. Enable NIC teaming. Configure the team to use Switch Independent mode.
C. Enable Bandwidth Management on NYC-WEB.
D. Run the Windows PowerShell command Set-NetLbfoTeam -Name Team1 -TeamingMode Static.
Answer: B
Explanation:
Ref: http://blogs.technet.com/b/privatecloud/archive/2012/06/19/nic-teaming-in-windows-
server-2012-brings-simple-affordable-traffic-reliability-and-load-balancing-to-your-cloud-workloads.aspx
Q27. RAG DROP
You have a Windows Server 2012 R2 server that has the Hyper-V role installed. The company has the following requirements for the Hyper-V host server:
. Virtual machines (VMs) must only communicate with other VMs. . You must be able to monitor all TCP/IP packets to and from VMs from the moment that VMs are able to communicate. . You must support a third-party program that uses the Network Driver Interface Specification (NDIS) API to monitor the TCP/IP packets between VMs.
You need to configure the environment.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q28. You administer a server that runs Windows Server 2012 R2 that has the Hyper-V role installed. You plan to apply an update to a virtual machine (VM). You have the following requirements:
. You must be able to quickly revert back to a pre-update state.
. The solution must minimize storage requirements on the server.
You need to apply the update. What should you do?
A. Run the Windows PowerShell cmdlet New-VirtualDiskClone.
B. Create a checkpoint of the VM.
C. Run the Windows PowerShell cmdlet Export-VMSnapshot.
D. Export the VM.
Answer: B
Explanation:
Ref: http://technet.microsoft.com/en-us/library/cc956044.aspx
Q29. A company has Active Directory Domain Services (AD DS) domain controllers that run on Windows Server 2012 R2 servers. There are two forests, and each has a single domain. There is a two-way forest trust between the forests. The company uses Hyper-V for server virtualization. The Hyper-V environment contains the Hyper-V host servers as shown in the following table:
You prepare to deploy System Center 2012 R2 Data Protection Manager (DPM) to back up the Hyper-V environment. The deployment must meet the following requirements:
. ensure that all Hyper-V servers can be backed up from a minimum of two DPM servers . minimize the total number of DPM servers
You need to deploy DPM to the environment.
What should you deploy?
A. four DPM servers in the internal network and two DPM servers in the perimeter network
B. two DPM servers in the internal network and one DPM server in the perimeter network
C. two DPM servers in the internal network only
D. two DPM servers in the internal network and two DPM servers in the perimeter network
Answer: C
Explanation:
DPM can protect servers and workstations across domains within a forest that has a two-way trust relationship with the domain that the DPM server is located in. If there is not a two-way trust across domains, you can protect the computers using DPM’s support for computers in workgroups or untrusted domains. For more information, see.Managing Protected Computers in Workgroups and Untrusted Domains.DPM supports data protection across forests as long as you establish a forest-level, two-way trust between the separate forests.
Ref: http://technet.microsoft.com/en-us/library/hh758176.aspx
Q30. RAG DROP
You are the virtualization administrator for an organization. The organization uses all components of System Center 2012 R2 in its production environment.
You need to configure the environment to support Performance and Resource Optimization (PRO).
How should you configure the environment? To answer, drag the appropriate server role to the correct location or locations. Each server role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer: