Proper study guides for Most up-to-date Microsoft Server Virtualization with Windows Server Hyper-V and System Center certified begins with Microsoft 74-409 preparation products which designed to deliver the Download 74-409 questions by making you pass the 74-409 test at your first time. Try the free 74-409 demo right now.
Q21. A company has Hyper-V host servers that run Windows Server 2012. The company also has virtual machines that run Windows Server 2008 R2 or Windows Server 2012.
You upgrade the Hyper-V host servers to Windows Server 2012 R2.
You need to ensure that all virtual machines can PXE boot by using a standard network adapter.
What should you do?
A. Create Generation 2 virtual machines.
B. Upgrade all existing virtual machines to Windows Server 2012 R2.
C. Upgrade the existing virtual machines that run Windows Server 2008 R2 to Windows Server 2012 R2.
D. Create Generation 1 virtual machines.
Answer: A
Explanation:
Ref: http://technet.microsoft.com/en-us/library/dn282285.aspx Gen 2 VMs allow PXE booting
Q22. A company uses System Center 2012 R2 Virtual Machine Manager (VMM).
You have the following requirements:
. Self-service users must be able to store and share their resources. . Self-service users must be able to use the resources to create profiles and templates in VMM.
You need to configure VMM to support self-service users.
Which three actions should you perform? Each correct response presents part of the solution.
A. In the VMM library share, create a user data path.
B. Grant the Read permission and the Write permission to all role members.
C. In the Public Documents share, create a user data path.
D. Assign the Deploy action to the role members.
E. Grant the Read & execute permission to all role members.
F. Assign the Author action to the role members.
Answer: A,B,F
Explanation: A (not C): VMM for System Center 2012 allows self-service users to use the VMM console, and to see their logical and physical resources in the Library workspace.
* Self-service user data paths Configure user data paths on self-service user roles to provide a place where members of a self-service user role can upload and share their own resources. The user data path also is the best place for administrators to store resources that only members of a self-service user role need to use.
B: (not E) Access control permissions determine whether the users have Read/Write or Read/only access.
F (not D):
*
Author Grants members permission to author templates and profiles. Users with authoring rights can create hardware profiles, operating system profiles, application profiles, SQL Server profiles, virtual machine templates and service templates.
*
Deploy Grants members permission to deploy virtual machines and services from templates and virtual hard disks that are assigned to their user role. However, they do not have the right to author templates and profiles.
Q23. ...
A company has a Windows Server 2012 R2 server that has the Hyper-V role installed. The server hosts 12 virtual machines (VMs) that run Windows Server 2012 R2. The company plans to deploy System Center 2012 R2 Data Protection Manager (DPM).
The company has identified the following requirements for the DPM deployment:
allow files and folders on VMs to be recovered allow recovery of data to a network share minimize the number of DPM protection agents that you must deploy
You need to implement the backup solution.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Deploy a DPM server.
B. Deploy the DPM protection agent to VMs.
C. Add the Hyper-V role to the DPM server.
D. Configure DPM to perform guest-level backups of the VMs.
E. Configure DPM to perform host-level backups of the VMs.
Answer: A,C
Explanation: * DPM protection supports the following scenarios:
/ (this scenario) Protects virtual machines that are hosted on stand-alone servers that run
Hyper-V and that use local or directly attached storage.
/ Protects virtual machines that run on a cluster. The cluster uses Cluster Shared Volumes
(CSV) storage.
/Protects virtual machines that run on a stand-alone server or cluster and that use SMB 3.0 file server storage.
/Protects virtual machines that are running during a live migration.
* Example: Protection for virtual machines on a stand-alone server that is running Hyper-V
Hyper-V on Standalone
This configuration protects one or more virtual machines on a stand-alone host computer.
Storage can be local on the host server, or directly attached to it, for example a hard drive,
a storage area network (SAN) device, or a network attached storage (NAS) device.
Alternatively, the host server might use SMB 3.0 storage on an alternate file server. The
DPM protection agent must be installed on all hosts and on the file server if storage is
hosted by using SMB 3.0.
Incorrect:
Not B: Would not minimize the number of Protection Agents.
Ref: https://social.technet.microsoft.com/wiki/contents/articles/17493.protecting-hyper-v-virtual-machines-with-system-center-dpm-2012.aspx
Q24. You have three Windows Server 2012 R2 servers that are set up as a Hyper-V cluster. You use System Center 2012 R2 Virtual Machine Manager to manage the Hyper-V environment.
Users report that when a Hyper-V host server becomes overloaded, the performance of the virtual machines is unacceptable.
You need to analyze workloads and automatically migrate virtual machines from overloaded host servers to host clusters that have available capacity.
What should you configure?
A. Performance and Resource Optimization (PRO)
B. Placement Rules
C. shared .vhdx file
D. Dynamic Optimization
Answer: D
Explanation: Ref: http://technet.microsoft.com/en-us/library/gg675109.aspx Dynamic Optimization in VMM During Dynamic Optimization, VMM migrates virtual machines within a host cluster to improve load balancing among hosts and to correct any placement constraint violations for virtual machines.
Dynamic Optimization can be configured on a host group, to migrate virtual machines within host clusters with a specified frequency and aggressiveness. Aggressiveness determines the amount of load imbalance that is required to initiate a migration during Dynamic Optimization. By default, virtual machines are migrated every 10 minutes with medium aggressiveness. When configuring frequency and aggressiveness for Dynamic Optimization, an administrator should factor in the resource cost of additional migrations against the advantages of balancing load among hosts in a host cluster. By default, a host group inherits Dynamic Optimization settings from its parent host group.
Dynamic Optimization can be set up for clusters with two or more nodes. If a host group contains stand-alone hosts or host clusters that do not support live migration, Dynamic Optimization is not performed on those hosts. Any hosts that are in maintenance mode also are excluded from Dynamic Optimization. In addition, VMM only migrates highly available virtual machines that use shared storage. If a host cluster contains virtual machines that are not highly available, those virtual machines are not migrated during Dynamic Optimization. On demand Dynamic Optimization also is available for individual host clusters by using the Optimize Hosts action in the VMs and Services workspace. On demand Dynamic Optimization can be performed without configuring Dynamic Optimization on host groups. After Dynamic Optimization is requested for a host cluster, VMM lists the virtual machines that will be migrated for the administrator's approval.
Q25. OTSPOT
A company has a Hyper-V environment that includes three servers named HOST1, HOST 2, and FILESERVER1. HOST1 and HOST2 run Windows Server 2012 R2 that have the Hyper-V role installed. FILESERVER1 runs Windows Server 2008 R2 and has the File Services role installed. All of the hardware supports Offloaded Data Transfer (ODX).
The servers are configured as shown in the following diagram:
STORAGE1 is encrypted with BitLocker.
You need to support ODX for all of the virtual machines on HOST1.
Use the drop-down menus to complete each statement based on the information presented
in the screenshot. Each correct selection is worth one point.
Answer:
Q26. RAG DROP
A company has a single-domain Active Directory Domain Services (AD DS) environment. Some servers and all domain controllers are deployed on the internal network. All servers in the perimeter network are joined to a workgroup. The company uses System Center 2012 R2 Operations Manager to monitor the server infrastructure on the internal network.
The company plans to use Audit Collection Services (ACS) for one Internet Information Services (IIS) server that is in the perimeter network.
You need to configure the authentication type and ACS role for Operations Manager and the IIS server.
How should you configure the servers? To answer, drag the appropriate authentication type and ACS role to the location or locations in the answer area. Each authentication type and ACS role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q27. A company has a network that contains one Active Directory Domain Services (AD DS) domain. The domain and forest functional levels are set to Windows Server 2008. All domain controllers run Windows Server 2012.
You need to enable the Active Directory Recycle Bin for the forest. What should you do?
A. Raise the domain and forest functional levels to Windows Server 2012 R2.
B. Deploy new domain controllers that have Windows Server 2012 R2 installed.
C. Raise the domain and forest functional levels to Windows Server 2008 R2.
D. Upgrade the domain controllers to Windows Server 2012 R2.
Answer: C
Explanation:
Ref: http://technet.microsoft.com/en-us/library/dd379484(v=ws.10).aspx By default. Active Directory Recycle Bin in Windows Server 2008 R2 is disabled. To enable it, you must first raise the forest functional level of your AD DS or AD LDS environment to Windows Server 2008 R2, which in turn requires all forest domain controllers or all servers that host instances of AD LDS configuration sets to be running Windows Server 2008 R2. After you set the forest functional level of your environment to Windows Server 2008 R2, you can use the instructions in this guide to enable Active Directory Recycle Bin.
Q28. RAG DROP
You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. You have the following virtual machines (VMs):
You also have the following two switches:
VM-Server1 has network connectivity to VM-Server2 and VM-Server3, as well as the host server, VM-Server4 has network connectivity to VM-Server5, but NOT to the host server.
You need to configure VM-Server6 to ensure that VM-Server6 has network connectivity only to the other test VMs.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order,
Answer:
Q29. A company has Hyper-V host servers and virtual machines (VMs). All host servers and VMs run Windows Server 2012 R2. You need to ensure that new VMs can boot from a SCSI virtual hard disk. What should you create?
A. virtual disks that use the virtual hard disk (VHD) format
B. virtual disks that use the VHDX format
C. Generation 1 VMs
D. Generation 2 VMs
Answer: D
Explanation:
Ref: http://technet.microsoft.com/en-us/library/dn282285.aspx
Q30. RAG DROP
You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. The host server has the following configuration:
You deploy a new lab virtual machine named VM-SERVER3.
You need to ensure that VM-SERVER3 communicates only with VM-SERVER1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer: