Cause all that matters here is passing the Microsoft 74-409 exam. Cause all that you need is a high score of 74-409 Server Virtualization with Windows Server Hyper-V and System Center exam. The only one thing you need to do is downloading Ucertify 74-409 exam study guides now. We will not let you down with our money-back guarantee.
Q51. You use System Center 2012 R2 Operations Manager to monitor the datacenter infrastructure and applications for an organization. You import the SQL Server
Management Pack.
You are unable to monitor long-running SQL Server Agent jobs. You observe that the SQL Server Agent Jobs View displays zero instances. Other SQL Server-related monitoring operations function as expected.
You need to monitor long-running SQL Server Agent jobs.
What should you do?
A. Enable the Job Duration unit monitor.
B. Enable agent proxy for SQL Servers.
C. Enable the object discovery for the SQL Server Agent Job class.
D. End maintenance mode for the SQL Server 2012 Computers group.
Answer: C
Explanation:
http://blogs.technet.com/b/kevinholman/archive/2011/08/05/how-to-monitor-sql-agent-jobs-using-the-sqlmanagement-pack-and-opsmgr.aspx Ref: http://www.toolzz.com/?p=162
Q52. You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. The server hosts three virtual machines (VMs).
One of the VMs is managed by a security engineer. The security engineer must capture traffic on another VM that is running on the same server.
You need to ensure that the security engineer can access the network traffic information from the target VM.
Which networking feature should you enable?
A. port mirroring
B. NIC teaming
C. Protected network
D. MAC address spoofing
Answer: A
Explanation:
Ref: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror
Port Mirroring With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring - an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic.
The following examples configure port mirroring so that all traffic that is sent and received by both MyVM and MyVM2 is also sent to the VM named MonitorVM.
C:\Documents and Settings\Adnan Hameed\Desktop\untitled.PNG
Q53. You have a Windows Server 2012 R2 server with the Hyper-V role installed. The host server hosts a virtual machine (VM) named NYC-VM. The virtual switches for the host server are configured as follows:
NYC-VM must meet the following requirements:
...
communicate with all of the VMs on the same virtualization host server communicate with the virtualization host server must NOT communicate with VMs on different virtualization host servers You need to configure the virtual switch for NYC-VM.
What should you do?
A. On NYC-VM, enable virtual LAN identification.
B. Run the Windows PowerShell command Connect-VMNetworkAdapter -VMName NYC-VM -SwitchName INT.
C. Connect NYC-VM to the EXT switch.
D. Run the Windows PowerShell command Connect-VMNetworkAdapter -VMName NYC-VM -SwitchName EXT.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc816585%28v=ws.10%29.aspx
Q54. A company has seven Windows Server 2012 R2 virtual machines (VMs). The VMs are running and are accessible over the network. You plan to copy a large .ISO file from the host server to each of the VMs.
The copy operations must meet the following requirements:
..
The VMs must remain accessible over the network during the copy operations. The copy operations must NOT use a network connection.
You need to configure the VMs. What should you do on each VM?
A. Enable the Guest services integration service.
B. Enable the Data Exchange integration service.
C. Add a network adapter, and then enable the virtual machine queue (VMQ) option on the adapters.
D. Set the value of the Smart Paging File Location property to %SYSTEMROOT%\temp.
Answer: A
Explanation: Ref: http://technet.microsoft.com/en-us/library/dn282278.aspx
Q: What is the new Guest services integration service in Windows Server 2012 R2 Hyper-V?
A: Several integration services are available for virtual machines (VMs) such as time synchronization, heartbeat, backup, OS shutdown, and data exchange. In Windows Server 2012 R2, a new integration service has been added, Guest services. Guest services enables the copying of files to a VM using WMI APIs or using the new Copy-VMFile Windows PowerShell cmdlet.
Q55. You have a Windows Server 2012 R2 Hyper-V environment that includes System Center 2012 R2 Virtual Machine Manager (VMM). The environment includes five physical servers. The servers are configured as follows:
You plan to use VMM to migrate physical machines to virtual machines.
You need to reconfigure the hardware on the servers to support a physical to virtual offline
migration.
Which three servers should you reconfigure? Each correct answer presents part of the solution.
A. NYC-FS
B. NYC-DEV
C. NYC-EX
D. NYC-PR
E. NYC-WEB
Answer: A,C,D
Explanation:
You need to find servers which CANNOT go thru P2V migration.
P2V Prerequisites in VMM
Requirements on the source machine
The physical computer to be converted must meet the following requirements:
-Must have at least 512 MB of RAM.
-Cannot have any volumes larger than 2040 GB.
-
Must have an Advanced Configuration and Power Interface (ACPI) BIOS. Vista WinPE
will not install on a non-ACPI BIOS.
-
Must be accessible by VMM and by the virtual machine host.
-Cannot be in a perimeter network.
--> A perimeter network, which is also known as a screened subnet, is a collection of
devices and subnets that are placed between an intranet and the Internet to help protect
the intranet from unauthorized Internet users. The source computer for a physical-to-virtual
(P2V) conversion can be in any other network topology in which the VMM management
server can connect to the source machine to temporarily install an agent and can make
Windows Management Instrumentation (WMI) calls to the source computer.
-The source computer should not have encrypted volumes.
--> If the source computer has encrypted volumes, an offline P2V conversion may render
the computer unbootable.
Answer: So based on the prerequisites, NYC-FS, NYC-EX and NYC-PR needs to be re-configured.
UPDATE:
As of System Center 2012 R2, you can no longer perform P2V conversions in VMM.
For information about how to use an earlier version of Virtual Machine Manager to mitigate
this change, see the:
"How to perform a P2V in a SCVMM 2012 R2 environment blog" -
http://blogs.technet.com/b/scvmm/archive/2013/10/03/how-to-perform-a-p2v-in-a-scvmm-2012-r2-environment.aspx Technet Reference: http://technet.microsoft.com/en-us/library/hh427293.aspx
Q56. You have a Windows Server 2012 R2 Hyper-V environment that includes System Center 2012 R2 Virtual Machine Manager (VMM). The environment includes five physical servers. The servers are configured as follows:
You plan to use VMM to migrate physical machines to virtual machines.
You must migrate all servers that support physical to virtual (P2V) migration.
You need to migrate the servers.
Which three servers should you migrate? Each correct answer presents part of the
solution.
A. NYC-WEB
B. NYC-PR
C. NYC-DEV
D. NYC-FS
E. NYC-EX
Answer: A,B,C
Explanation: The source computer cannot have any volumes larger than 2040 GB. This disqualifies NYC-FS( not D) and NYC-EX (not E).
Note:
* Requirements on the Source Machine
To perform a P2V conversion, your source computer:
/Must have at least 512 MB of RAM.
/ Cannot have any volumes larger than 2040 GB.
/ Must have an Advanced Configuration and Power Interface (ACPI) BIOS – Vista WinPE will not install on a non-ACPI BIOS.
/ Must be accessible by VMM and by the host computer.
/ Cannot be in a perimeter network. A perimeter network, which is also known as a screened subnet, is a collection of devices and subnets placed between an intranet and the Internet to help protect the intranet from unauthorized Internet users. The source computer for a P2V conversion can be in any other network topology in which the VMM server can connect to the source machine to temporarily install an agent and can make Windows Management Instrumentation (WMI) calls to the source computer.
Q57. You are the virtualization administrator for an organization that manages private and public cloud resources.
The organization has a Windows Azure subscription. You plan to move virtual machines to Windows Azure Infrastructure as a Service (IaaS) by using System Center 2012 R2 App Controller.
You need to create a virtual machine template that allows virtual machines to be moved from Hyper-V to Windows Azure.
What should you do?
A. Create a new virtual machine that uses a .vhd file. Run the Sysprep tool on the virtual machine.
B. Create a new Generation 2 virtual machine that uses a .vhdx file that is attached to a SCSI controller. Run the Sysprep tool on the virtual machine.
C. Create a new virtual machine that uses a .vhdx file. Run the Sysprep tool on the virtual machine.
D. Create a virtual machine by using a differencing disk. Use the Clone a virtual machine option to create new virtual machines.
Answer: A
Explanation:
http://blogs.msdn.com/b/how24/archive/2012/11/06/windows-azure-iaas-upload-a-custom-build-vmtemplate.aspx
http://blogs.technet.com/b/kevinremde/archive/2013/05/29/migrating-vms-from-hyper-v-to-windows-azure-20-key-scenarios-with-windows-azure-infrastructure-services.aspx
Note: Azure v1.7 and below does not support VHDX files Ref: http://www.windowsazure.com/en-us/documentation/articles/virtual-machines-create-upload-vhd-windows-server/
Q58. A company has a highly-secure network infrastructure environment. All servers in the environment run Windows Server 2012 R2.
You must create a new virtual machine (VM) that meets the following requirements:
. The VM must minimize the risk that unauthorized firmware will run when the VM starts.
. The VM must load the operating system only if all operating system files have a valid signature.
You need to create the new VM. What should you do?
A. Create a Generation 2 VM and disable Secure Boot.
B. Create a Generation 1 VM and use a synthetic network adapter.
C. Create a Generation 1 VM and enable Secure Boot.
D. Create a Generation 2 VM with the default settings.
Answer: D
Explanation: Ref: http://technet.microsoft.com/en-us/library/dn282285.aspx
Secure Boot is a feature that helps prevent unauthorized firmware, operating systems, or UEFI drivers (also known as option ROMs) from running at boot time.
Note Secure Boot is enabled by default for generation 2 virtual machines. This can be modified after the virtual machine has been created.