Which two actions should you perform to configure the web.contoso.com Network Load Balancing cluster to accept
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster.
The cluster is intended to provide high availability and load balancing for only the intranet Web site.
The name of the cluster is web.contoso.com.
You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name.
The web.contoso.com Network Load Balancing cluster is configured with only one port rule.
You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic.
exhibit Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do first to configure the virtual machine to meet the following requirements?
You have a server that runs Windows Server 2008 R2 and has the Hyper-V server role installed.
You create a new virtual machine.
You need to configure the virtual machine to meet the following requirements:
* Allow network communications between the virtual machine and the host system.
* Prevent communications to other network servers.
exhibit What should you do first?
What should you do to merge a differencing disk and a parent disk?
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk.
exhibit What should you do?
What should you do to ensure that users receive e-mail alerts and invitations?
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 is an SMTP server.
Server2 has Microsoft SharePoint Foundation 2010 installed. On Server2, you configure Server1 as an outbound e-mail server.
You discover that users never receive e-mail alerts and invitations.
You need to ensure that users receive e-mail alerts and invitations.
exhibit What should you do?
What should you do first?
Your network contains a server that runs Windows Server 2008 R2 Standard. The server is configured to native boot from a virtual hard disk (VHD). All hard disks on the server are configured as basic disks that use an MBR. A new corporate security policy states that all of the hard disks on the server must use Windows BitLocker Drive Encryption (BitLocker). You need to ensure that the server meets the corporate security policy. What should you do first?
What should you do first?
Your network contains two servers that have the HyperV server role installed. You install the Failover Clustering feature on both servers. You add both servers as nodes in the cluster. You need to ensure that you can perform live migrations of individual virtual machines (VMs) between the nodes. The solution must minimize the number of volumes required to host the VMs. What should you do first?
Which quorum model should you select?
Your network contains two servers that run Windows Server 2008 R2. The servers are located on different IP subnets.
You plan to configure the servers in a twonode failover cluster. You need to select the quorum model for the cluster. The solution must ensure that users can access the cluster resources if a single node fails.
Which quorum model should you select?
What should you modify?
Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role installed. Virtual machines (VMs) are frequently added to the HyperV server. You need to ensure that a VM named VM1 has priority regarding the allocation of the physical CPU resources on the HyperV host.
What should you modify?
What should you do first?
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs). One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy the VHDs. The solution must minimize the amount of downtime for VM1.
What should you do first?
What should you do first?
Your network contains a twonode HyperV cluster that hosts 10 virtual machines (VMs). You discover that when a failover occurs, all of the VMs fail over simultaneously. You need to modify the cluster so that you can fail over each VM individually.
What should you do first?