Which firewall port should you open?
Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the
environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2
You attempt to migrate child partitions through a firewall by using network migration. The
migration fails. You need to ensure that you can successfully complete the migration. Which
firewall port should you open?
You need to add a virtual disk to the VM without shutting down the VM
You are configuring a virtual machine (VM) that is running on a Windows Server 2008 R2
host server. The primary virtual disk is connected to IDE Controller 0. You need to add a
virtual disk to the VM without shutting down the VM. What should you do?
You need to add five new virtual disks to the VM
You create a virtual machine (VM) on a Windows Server 2008 R2 Hyper-V server. The VM
has a single VHD file that is connected to an IDE controller. You need to add five new virtual
disks to the VM. You must minimize the amount of virtual hardware. What should you do?
You need to configure each VM so that you can perform a network-based operating system installation
You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V
environment. You need to configure each VM so that you can perform a network-based
operating system installation. What should you do for each VM?
You need to ensure that members of the Monitoring group can only stop and start VMs on the host server
Your company has an Active Directory Domain Services (AD DS) domain that includes an
AD security group named Monitoring. You are configuring a Windows Server 2008 R2
Hyper-V server that hosts several virtual machines (VMs). You need to ensure that members
of the Monitoring group can only stop and start VMs on the host server. What should you
do?
You need to ensure that on a specific host server, members of the Development group can perform only the Creat
You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System
Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD
security group named Development. You need to ensure that on a specific host server,
members of the Development group can perform only the Create, Modify, and Remove VM
management tasks. What should you do?
You need to enable non-administrative users to manage snapshots or checkpoints for virtual machines (VMs) that
Your virtual environment includes Hyper-V host servers and VMware ESX Server hosts. You
manage the environment by using Microsoft System Center Virtual Machine Manager (VMM)
2008 R2. You need to enable non-administrative users to manage snapshots or checkpoints
for virtual machines (VMs) that are hosted on either host system. What should you do?
You need to be able to manage the VM by using VMM
You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing
Hyper-V failover cluster. After you move a virtual machine (VM) to the new cluster node,
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the
VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using
VMM. What should you do?
You need to ensure that the RD Session Host server will receive only half of the RDS sessions
All servers on your companys network run Windows Server 2008 R2. You deploy Remote
Desktop Services (RDS). The company has a load-balanced Remote Desktop Connection
Broker (RD Connection Broker) cluster. You are adding a Remote Desktop Session Host
(RD Session Host) server to the cluster. You need to ensure that the RD Session Host
server will receive only half of the RDS sessions. What should you do?
You need to ensure that the users can connect to remote applications
Your network includes the servers shown in the following table.
Per-Device Remote Desktop Services client access licenses (RDS CALs) are installed on
Server1. After you refresh a group of client computers with Windows 7, users on those
computers can no longer connect to Server2. You need to ensure that the users can connect
to remote applications. What should you do?