which method should you move VM1?
You have a datacenter that contains six servers. Each server has the Hyper-V server role
installed and runs Windows Server 2012 R2. The servers are configured as shown in the
following table.
Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine
named VM1.
You need to move VM1 to another Hyper-V host. The solution must minimize the downtime
of VM1.
To which server and by which method should you move VM1?
Which rule types should you configure on each side of the federated trust?
DRAG DROP
Your network contains two Active Directory forests named contoso.com and adatum.com. All
domain controllers run Windows Server 2012 R2.
A federated trust exists between adatum.com and contoso.com. The trust provides
adatum.com users with access to contoso.com resources.
You need to configure Active Directory Federation Services (AD FS) claim rules for the
federated trust.
The solution must meet the following requirements:
In contoso.com, replace an incoming claim type named Group with an outgoing claim type
named Role.
In adatum.com, allow users to receive their tokens for the relying party by using their Active
Directory group membership as the claim type.
The AD FS claim rules must use predefined templates.
Which rule types should you configure on each side of the federated trust?
To answer, drag the appropriate rule types to the correct location or locations. Each rule type
may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Which cmdlet should you run?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered
Shared Volume (CSV).
A developer creates an application named App1. App1 is NOT a cluster-aware application.
App1 stores data in the file system.
You need to ensure that App1 runs in Cluster1. The solution must minimize development
effort.
Which cmdlet should you run?
Which three actions should you perform in sequence?
DRAG DROP
You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the
clusters run Windows Server 2012 R2.
Cluster1 hosts two virtual machines named VM1 and VM2.
You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3.
You need to configure the witness disk for Cluster3 to be hosted on Cluster2.
Which three actions should you perform in sequence?
To answer, move the appropriate three actions from the list of actions to the answer area
and arrange them in the correct order.
What command should you run?
HOTSPOT
Your network contains two Web servers named Server1 and Server2. Both servers run
Windows Server 2012 R2.
Server1 and 5erver2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster
contains an application named App1 that is accessed by using the URL
http://app1.contoso.com.
You deploy a new server named Server3 that runs Windows Server 2012 R2. The
contoso.com DNS zone contains the records shown in the following table.
You need to add Server3 to the NLB cluster.
What command should you run?
To answer, select the appropriate options in the answer area.
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers
are configured as nodes in an NLB cluster named Cluster1.
Port rules are configured for all clustered Applications.
You need to ensure that Server2 handles all client requests to the cluster that are NOT
covered by a port rule.
What should you configure?
What should you run from Windows PowerShell?
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains four member servers named Server1, Server2, Server3, and Server4. All servers
run Windows Server 2012 R2.
Server1 and Server3 are located in a site named Site1. Server2 and Server4 are located in a
site named Site2. The servers are configured as nodes in a failover cluster named Cluster1.
Dynamic quorum management is disabled.
Cluster1 is configured to use the Node Majority quorum configuration.
You need to ensure that users in Site2 can access Cluster1 if the network connection
between the two sites becomes unavailable.
What should you run from Windows PowerShell?
To answer, drag the appropriate commands to the correct location. Each command may be
used once, more than once, or not at all. You may need to drag the split bar between panes
or scroll to view content.
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1.
Cluster1 hosts an Application named App1.
You need to ensure that Server2 handles all of the client requests to the cluster for App1.
The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains Application data.
You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client
requests for Folder1.
What should you configure?
You need to configure the adatum.com zone to support Name Protection
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the
DNS Server server role installed.
The network contains client computers that run either Linux, Windows 7, or Windows 8.
You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)
You plan to configure Name Protection on all of the DHCP servers.
You need to configure the adatum.com zone to support Name Protection.
What should you do?