Which port or ports should you identify?
You need to identify which UDP port or ports must be opened on any of the firewalls between Server5 and all of the subnets in the data center.
The solution must minimize the number of ports opened on the firewall.
Which port or ports should you identify?
###BeginCaseStudy###
Case Study Title (Case Study):
Case Study 1 – Contoso Ltd
Overview
Contoso, Ltd. is a manufacturing company.
Contoso has a main office and six branch offices.
The main office is located in Toronto.
The branch offices are located in New York, Seattle, Miami, Montreal, Los Angeles, and Vancouver.
Existing Environment
Active Directory Environment
The network contains an Active Directory forest named contoso.com.
The forest contains a child domain for each office.
Active Directory currently contains 7,500 user accounts and 15,000 computer accounts.
Network Infrastructure
All servers are located in a data center in Toronto. The data center contains multiple subnets that are separated by firewalls.
The Toronto data center contains a cluster that runs Microsoft SQL server 2008 Enterprise Service Pack 1 (SP1).
Four servers are unused and are being considered as potential Hyper-V hosts. The servers are configured as shown in the following table.
All of the servers being considered as potential Hyper-V hosts have both locally attached storage and access to a SAN.
Help Desk Environment
Contoso uses a help desk ticketing system that was developed in-house.
Fifty help desk agents have access to the ticketing system.
Ticketing system currently tracks:
– An average of two new incidents per month, per client computer.
– An average of 2,000 change requests per month.
Disaster Recovery Environment
Contoso uses a third party backup solution.
Backups are scheduled for the servers in the Seattle office as follows:
– The daily incremental backups total 10GB.
– The total size of data to backup is 100GB.
– Backed up data is retained for 10 business days.
Problem Statements
The original developers of the help desk ticketing system are no longer employed by Contoso and maintenance of the system is becoming an issue.
Requirements
Planned Changes
Contoso plans to move the IT infrastructure to a private cloud. Whenever possible, hardware and software costs must be minimized.
Contoso plans to open a small office in Beijing.
System Center 2012 App Controller will be used to manage applications. The display names of the applications will be in Simplified Chinese Pinyin IME. New
physical servers will be deployed by using System Center 2012 Configuration Manager from a server named Server5.
Server5 will also be a PXE service point.
The current backup solution will be replaced with System Center 2012 Data Protection Manager (DPM).
A public key infrastructure (PKI) will be deployed to issue and manage certificates. The PKI deployment must be made as secure as possible. Hardware load
balancers will be deployed for use in the deployment of private cloud services.
Cloud Requirements
Contoso plans to implement a cloud solution that meets the following requirements:
– Stores all virtual machines on the SAN only.
– Uses SAN copy to provision the virtual machines.
– Provides the ability to manage the resolution of incidents.
– Contains managed virtual machines across both private and public clouds.
– Provides the ability to customize the settings of management packs provided by Microsoft.
– Collects security events from all of the servers running in the private cloud and provides centralized reporting onthe events.
App1 Requirements
A new application named App1 will be deployed to the private cloud. App1 is a three-tier application that contains the following components:
– A front-end tier that runs a web server. The tier must be highly available and capable of being quickly scaled out if
required.
– A middle tier that runs an application server.
– A back-end tier that runs a database.
App2 Requirements
An application named App2 will be deployed to the public cloud. Users will be authenticated by using the on-premises Active Directory. The users must be able to
access App2 without being prompted for authentication again.
###EndCaseStudy###
What should you recommend?
You need to recommend a solution for the management packs. The solution must meet the cloud requirements.
What should you recommend?
(More than one answer choice may achieve the goal. Select the BEST answer.)
###BeginCaseStudy###
Case Study Title (Case Study):
Case Study 1 – Contoso LtdOverview
Contoso, Ltd. is a manufacturing company.
Contoso has a main office and six branch offices.
The main office is located in Toronto.
The branch offices are located in New York, Seattle, Miami, Montreal, Los Angeles, and Vancouver.
Existing Environment
Active Directory Environment
The network contains an Active Directory forest named contoso.com.
The forest contains a child domain for each office.
Active Directory currently contains 7,500 user accounts and 15,000 computer accounts.
Network Infrastructure
All servers are located in a data center in Toronto. The data center contains multiple subnets that are separated by firewalls.
The Toronto data center contains a cluster that runs Microsoft SQL server 2008 Enterprise Service Pack 1 (SP1).
Four servers are unused and are being considered as potential Hyper-V hosts. The servers are configured as shown in the following table.
All of the servers being considered as potential Hyper-V hosts have both locally attached storage and access to a SAN.
Help Desk Environment
Contoso uses a help desk ticketing system that was developed in-house.
Fifty help desk agents have access to the ticketing system.
Ticketing system currently tracks:
– An average of two new incidents per month, per client computer.
– An average of 2,000 change requests per month.
Disaster Recovery Environment
Contoso uses a third party backup solution.
Backups are scheduled for the servers in the Seattle office as follows:
– The daily incremental backups total 10GB.
– The total size of data to backup is 100GB.
– Backed up data is retained for 10 business days.Problem Statements
The original developers of the help desk ticketing system are no longer employed by Contoso and maintenance of the system is becoming an issue.
Requirements
Planned Changes
Contoso plans to move the IT infrastructure to a private cloud. Whenever possible, hardware and software costs must be minimized.
Contoso plans to open a small office in Beijing.
System Center 2012 App Controller will be used to manage applications. The display names of the applications will be in Simplified Chinese Pinyin IME. New
physical servers will be deployed by using System Center 2012 Configuration Manager from a server named Server5.
Server5 will also be a PXE service point.
The current backup solution will be replaced with System Center 2012 Data Protection Manager (DPM).
A public key infrastructure (PKI) will be deployed to issue and manage certificates. The PKI deployment must be made as secure as possible. Hardware load
balancers will be deployed for use in the deployment of private cloud services.
Cloud Requirements
Contoso plans to implement a cloud solution that meets the following requirements:
– Stores all virtual machines on the SAN only.
– Uses SAN copy to provision the virtual machines.
– Provides the ability to manage the resolution of incidents.
– Contains managed virtual machines across both private and public clouds.
– Provides the ability to customize the settings of management packs provided by Microsoft.
– Collects security events from all of the servers running in the private cloud and provides centralized reporting on
the events.
App1 Requirements
A new application named App1 will be deployed to the private cloud. App1 is a three-tier application that contains the following components:
– A front-end tier that runs a web server. The tier must be highly available and capable of being quickly scaled out if
required.
– A middle tier that runs an application server.
– A back-end tier that runs a database.
App2 Requirements
An application named App2 will be deployed to the public cloud. Users will be authenticated by using the on-premises Active Directory. The users must be able to
access App2 without being prompted for authentication again.
###EndCaseStudy###
Which components should you identify?
You need to identify which components must be created to meet the App1 deployment requirements.
Which components should you identify?
###BeginCaseStudy###
Case Study Title (Case Study):
Case Study 1 – Contoso Ltd
Overview
Contoso, Ltd. is a manufacturing company.
Contoso has a main office and six branch offices.
The main office is located in Toronto.
The branch offices are located in New York, Seattle, Miami, Montreal, Los Angeles, and Vancouver.
Existing Environment
Active Directory Environment
The network contains an Active Directory forest named contoso.com.
The forest contains a child domain for each office.
Active Directory currently contains 7,500 user accounts and 15,000 computer accounts.
Network Infrastructure
All servers are located in a data center in Toronto. The data center contains multiple subnets that are separated by firewalls.
The Toronto data center contains a cluster that runs Microsoft SQL server 2008 Enterprise Service Pack 1 (SP1).
Four servers are unused and are being considered as potential Hyper-V hosts. The servers are configured as shown in the following table.
All of the servers being considered as potential Hyper-V hosts have both locally attached storage and access to a SAN.
Help Desk Environment
Contoso uses a help desk ticketing system that was developed in-house.
Fifty help desk agents have access to the ticketing system.
Ticketing system currently tracks:
– An average of two new incidents per month, per client computer.
– An average of 2,000 change requests per month.
Disaster Recovery Environment
Contoso uses a third party backup solution.
Backups are scheduled for the servers in the Seattle office as follows:
– The daily incremental backups total 10GB.
– The total size of data to backup is 100GB.
– Backed up data is retained for 10 business days.
Problem Statements
The original developers of the help desk ticketing system are no longer employed by Contoso and maintenance of the system is becoming an issue.
Requirements
Planned Changes
Contoso plans to move the IT infrastructure to a private cloud. Whenever possible, hardware and software costs must be minimized.
Contoso plans to open a small office in Beijing.
System Center 2012 App Controller will be used to manage applications. The display names of the applications will be in Simplified Chinese Pinyin IME. New
physical servers will be deployed by using System Center 2012 Configuration Manager from a server named Server5.
Server5 will also be a PXE service point.
The current backup solution will be replaced with System Center 2012 Data Protection Manager (DPM).
A public key infrastructure (PKI) will be deployed to issue and manage certificates. The PKI deployment must be made as secure as possible. Hardware load
balancers will be deployed for use in the deployment of private cloud services.
Cloud RequirementsContoso plans to implement a cloud solution that meets the following requirements:
– Stores all virtual machines on the SAN only.
– Uses SAN copy to provision the virtual machines.
– Provides the ability to manage the resolution of incidents.
– Contains managed virtual machines across both private and public clouds.
– Provides the ability to customize the settings of management packs provided by Microsoft.
– Collects security events from all of the servers running in the private cloud and provides centralized reporting on
the events.
App1 Requirements
A new application named App1 will be deployed to the private cloud. App1 is a three-tier application that contains the following components:
– A front-end tier that runs a web server. The tier must be highly available and capable of being quickly scaled out if
required.
– A middle tier that runs an application server.
– A back-end tier that runs a database.
App2 Requirements
An application named App2 will be deployed to the public cloud. Users will be authenticated by using the on-premises Active Directory. The users must be able to
access App2 without being prompted for authentication again.
###EndCaseStudy###
What should you include in the recommendation?
You need to recommend a solution to meet the requirements for App2.
What should you include in the recommendation?
###BeginCaseStudy###
Case Study Title (Case Study):Case Study 1 – Contoso Ltd
Overview
Contoso, Ltd. is a manufacturing company.
Contoso has a main office and six branch offices.
The main office is located in Toronto.
The branch offices are located in New York, Seattle, Miami, Montreal, Los Angeles, and Vancouver.
Existing Environment
Active Directory Environment
The network contains an Active Directory forest named contoso.com.
The forest contains a child domain for each office.
Active Directory currently contains 7,500 user accounts and 15,000 computer accounts.
Network Infrastructure
All servers are located in a data center in Toronto. The data center contains multiple subnets that are separated by firewalls.
The Toronto data center contains a cluster that runs Microsoft SQL server 2008 Enterprise Service Pack 1 (SP1).
Four servers are unused and are being considered as potential Hyper-V hosts. The servers are configured as shown in the following table.
All of the servers being considered as potential Hyper-V hosts have both locally attached storage and access to a SAN.
Help Desk Environment
Contoso uses a help desk ticketing system that was developed in-house.
Fifty help desk agents have access to the ticketing system.
Ticketing system currently tracks:
– An average of two new incidents per month, per client computer.
– An average of 2,000 change requests per month.
Disaster Recovery Environment
Contoso uses a third party backup solution.
Backups are scheduled for the servers in the Seattle office as follows:
– The daily incremental backups total 10GB.- The total size of data to backup is 100GB.
– Backed up data is retained for 10 business days.
Problem Statements
The original developers of the help desk ticketing system are no longer employed by Contoso and maintenance of the system is becoming an issue.
Requirements
Planned Changes
Contoso plans to move the IT infrastructure to a private cloud. Whenever possible, hardware and software costs must be minimized.
Contoso plans to open a small office in Beijing.
System Center 2012 App Controller will be used to manage applications. The display names of the applications will be in Simplified Chinese Pinyin IME. New
physical servers will be deployed by using System Center 2012 Configuration Manager from a server named Server5.
Server5 will also be a PXE service point.
The current backup solution will be replaced with System Center 2012 Data Protection Manager (DPM).
A public key infrastructure (PKI) will be deployed to issue and manage certificates. The PKI deployment must be made as secure as possible. Hardware load
balancers will be deployed for use in the deployment of private cloud services.
Cloud Requirements
Contoso plans to implement a cloud solution that meets the following requirements:
– Stores all virtual machines on the SAN only.
– Uses SAN copy to provision the virtual machines.
– Provides the ability to manage the resolution of incidents.
– Contains managed virtual machines across both private and public clouds.
– Provides the ability to customize the settings of management packs provided by Microsoft.
– Collects security events from all of the servers running in the private cloud and provides centralized reporting on
the events.
App1 Requirements
A new application named App1 will be deployed to the private cloud. App1 is a three-tier application that contains the following components:
– A front-end tier that runs a web server. The tier must be highly available and capable of being quickly scaled out if
required.
– A middle tier that runs an application server.
– A back-end tier that runs a database.
App2 Requirements
An application named App2 will be deployed to the public cloud. Users will be authenticated by using the on-premises Active Directory. The users must be able to
access App2 without being prompted for authentication again.
###EndCaseStudy###
You need to change the primary management server used b…
Your company uses System Center 2012 R2 Operations Manager.
A technician manually installs the Microsoft Monitoring Agent on a server named Server1.
You discover that the agent is configured to use the wrong primary management server.
You need to change the primary management server used by Server1.
What should you do on Server1?
You need to ensure that the virtual machines on VLAN 1 …
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains one virtualization host named Server1.
You configure a logical network named Network1 that contains a network site named Site1.
DHCP allocates IP addresses on the network.
You configure the logical network as shown in the exhibit.
(Click the Exhibit button.)
You need to ensure that the virtual machines on VLAN 1 are assigned IP addresses from DHCP only.
What should you do?
Exhibit:
You need to ensure that address spaces created in VMM a…
Your network contains an Active Directory domain named contoso.com.
The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has System Center 2012 R2 Virtual Machine Manager (VMM) installed.
Server2 has the IP Address Management (IPAM) feature installed.You need to ensure that address spaces created in VMM are visible in IPAM.
What should you do?
Which table should you modify in the Reporting data war…
You deploy System Center 2012 R2 Operations Manager and import several management packs.
You need to modify the number of days that event data is stored in the database.
Which table should you modify in the Reporting data warehouse database?
Which table should you modify in the Reporting data war…
You deploy System Center 2012 R2 Operations Manager and import several management packs.
You need to modify the number of days that event data is stored in the database.
Which table should you modify in the Reporting data warehouse database?
You need to ensure that TestUser5 can add Host1 to the …
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains a server named VMM1.
A user named TestUser5 attempts to add a Hyper-V host named Host1 to the fabric.
TestUser5 enters the IP address of Host1 and receives the following error message:
“Access has been denied while contacting the server Host1.”
You verify that TestUser5 is assigned the Delegated Administrator User Role.You need to ensure that TestUser5 can add Host1 to the fabric.
What should you do?