What should you do?
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Hyper-V server role installed.
Server1 hosts a virtual machine (VM) named VM1.
You take a snapshot of VM1 at 05:00 and at 19:00.
You use Hyper-V Manager to delete the snapshot taken at 05:00. You need to ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1.
What should you do?
What should you do?
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is configured to use a 127-GB dynamically-expanding virtual hard disk (VHD). You need to add 500 GB of disk space to VM1. The solution must minimize the amount of downtime for VM1.
What should you do?
What should you do before you configure the pass-through disk?
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts a virtual machine (VM) named VM1.
You add an additional hard disk to Server1. The hard disk is configured as a basic disk. You need to configure VM1 to use the new hard disk as a pass-through disk. What should you do before you configure the pass-through disk?
What should you do?
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has two network adapters.
You need to configure Server1 to meet the following requirements:
All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
The number of virtual network connections must be minimized.
What should you do?
Which firewall rule should you enable on Server2?
Your network contains a server named Server1. Server1 has the Volume Activation Management Tool (VAMT) installed.
You need to activate Windows on a server named Server2 by using VAMT.
Which firewall rule should you enable on Server2?
What should you do first?
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to configure Server1 as a Key Management Service (KMS) host.
What should you do first?
Which SRV record should you create?
You need to manually create a service location (SRV) record for a server that has the Key Management Service (KMS) installed.
Which SRV record should you create?
What should you do?
You have a test lab that contains 20 client computers and a server named Server1. The client computers run Windows 7. Server1 runs Windows Server 2008 Service Pack 2 (SP2). You install the Key Management Service (KMS) on Server1. You need to ensure that the client computers can successfully activate by using Server1.
What should you do?
What are two possible ways to achieve this goal?
You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role and the FTP Service role service installed.
You add a new FTP site to the server.
You need to ensure that the new FTP site is available. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
Which Web site feature should you configure?
You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed.
The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.
Which Web site feature should you configure?