PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Hyper-V server role installed.
Server1 hosts a virtual machine (VM) named VM1.
You take a snapshot of VM1 at 05:00 and at 19:00.
You use Hyper-V Manager to delete the snapshot taken at 05:00. You need to ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1.
What should you do?

What should you do?

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is configured to use a 127-GB dynamically-expanding virtual hard disk (VHD). You need to add 500 GB of disk space to VM1. The solution must minimize the amount of downtime for VM1.
What should you do?

What should you do?

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has two network adapters.
You need to configure Server1 to meet the following requirements:
All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
The number of virtual network connections must be minimized.

What should you do?

What should you do?

You have a test lab that contains 20 client computers and a server named Server1. The client computers run Windows 7. Server1 runs Windows Server 2008 Service Pack 2 (SP2). You install the Key Management Service (KMS) on Server1. You need to ensure that the client computers can successfully activate by using Server1.
What should you do?

Which Web site feature should you configure?

You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed.
The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.
Which Web site feature should you configure?