PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Does this meet the goal?

Your network contains an Active Directory domain named contoso.com. The domain
contains three VLANs. The VLANs are configured as shown in the following table.

All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest
security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the
required security updates installed can connect to VLAN 1. The solution must ensure that all
other client computers connect to VLAN 3.
Solution: You implement the IPsec enforcement method.
Does this meet the goal?

What should you recommend?

Your network contains an Active Directory domain named contoso.com. The domain
contains multiple servers that run Windows Server 2012. All client computers run Windows 7.
The network contains two data centers.
You plan to deploy one file server to each data center.
You need to recommend a solution to provide redundancy for shared folders if a single data
center fails.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.

Which three actions should you recommend?

DRAG DROP
You have a failover cluster named Cluster1 that contains four Hyper-V hosts. Cluster1 hosts
20 virtual machines.
You deploy a new failover cluster named Cluster2.
You plan to replicate the virtual machines from Cluster1 to Cluster2.
You need to recommend which actions must be performed on Cluster2 for the planned
deployment.
Which three actions should you recommend?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.

What should you identify?

Your network contains an Active Directory forest named contoso.com.
You plan to deploy 200 Hyper-V hosts by using Microsoft System Center 2012 Virtual
Machine Manager (VMM) Service Pack 1 (SP1).
You add a PXE server to the fabric.
You need to identify which objects must be added to the VMM library for the planned
deployment.
What should you identify? (Each correct answer presents part of the solution. Choose all that
apply.)

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic

You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node
has four network adapters. The network adapters on each node are configured as shown in
the following table.

NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS).
The cluster networks are configured as shown in the following table.

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV)
redirected traffic.
What should you do?

Which three actions should you perform?

DRAG DROP
Your network contains two servers named Server1 and Server2 that run Windows Server
2012.
Server1 has the iSCSI Target Server role service installed and is configured to have five
iSCSI virtual disks.
You install the Multipath I/O (MPIO) feature on Server2.
From the MPIO snap-in, you add support for iSCSI devices.
You need to ensure that Server2 can connect to the five iSCSI disks. The solution must
ensure that Server2 uses MPIO to access the disks.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.

Which three actions should you perform?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains four servers named Server1, ServerZ Server3F and Server4 that run Windows
Server 2012.
Server1 and Server2 are configured as file servers and are part of a failover cluster named
Cluster1. Server3 and Server4 have Microsoft SQL Server 2012 installed and are part of a
failover cluster named Cluster2.
You add a disk named Disk1 to the nodes in Cluster1. Disk1 will be used to store the data
files and log files used by SQL Server 2012.
You need to configure the environment so that access to Disk1 remains available when a
node on Cluster1 fails over or fails back.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.

What are two possible profile types that achieve the goal?

You have a System Center 2012 R2 Virtual Machine Manager (VMM) infrastructure that
manages five Hyper-V hosts. The Hyper-V hosts are not clustered.
You have a virtual machine template that deploys a base image of Windows Server 2012
R2. No role services or features are enabled in the base image.
You need to deploy a virtual machine named VM1 that is based on the virtual machine
template.
VM1 will be deployed as part of a service. VM1 must have the Web Server (IIS) server role
installed. The solution must not require modifications to the virtual machine template or the
base image.
What are two possible profile types that achieve the goal? Each correct answer presents a
complete solution.