PrepAway - Latest Free Exam Questions & Answers

What should you configure?

###BeginCaseStudy###
Case Study: 1
Trey research
Scenario
Trey Research is a consulting company.
Trey Research has three offices. The offices are located in Seattle, Los Angeles, and Toronto.
Trey Research has two data centers. The data centers are located in Los Angeles and Toronto.
Existing Environment
The network contains a single-domain Active Directory forest named treyresearch.com. The network
contains switches that support either SNMPv1 or SNMPv2.
The forest contains 100 physical servers that run Windows Server 2008 R2 Service Pack 1 (SP1).
The relevant servers are configured as shown in the following table.

All of the System Center 2012 servers use Servers as a database server.
All of the VMM components in the production environment are installed on Server1. Server1 is
located in the Los Angeles data center.
Ten virtual machine hosts are located in the Toronto data center and 90 virtual machine hosts are
located in the Los Angeles data center.
Server9 is used to manage three virtualization hosts in a lab environment.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
• Upgrade Servers to VMM 2012.
• Discover and monitor network switches by using Operations Manager.
• Grant the network technicians the required permissions to configure the network fabric.
• Install a System Center 2012 Service Manager management server on Server7 and a Service
Manager data warehouse management server on Servers.
• Provide external access to the Virtual Machine Manager Self-Service Portal (VMMSSP) by
using the names ssp.treyresearch.com and vmm.treyresearch.com.
Private Cloud Infrastructure Requirements
Trey Research identifies the following requirements for the private cloud infrastructure:
• Integrate VMM 2012 and Operations Manager 2012.
• Ensure that all VMM 2012 components are highly available.
• Ensure that virtual machines use a MAC address from a custom MAC address pool.
• Ensure that Hyper-V hosts can be deployed to bare-metal computers from Server6.
• Control the placement of virtual machines based on the performance data gathered by
Operations Manager.
Private Cloud Compliance Requirements
Trey Research identifies the following requirements for compliance in the private cloud
infrastructure:
• Ensure that updates on the Hyper-V hosts can be remediated.
• Generate the compliance status of all the servers in the fabric.
• Ensure that update baselines for all of the servers in the fabric are created.
Private Cloud Services Requirements
Trey Research identifies the following requirements for managing services in the private cloud:
• Users in the human resources department must be able to create virtual machines that have
two CPUs and 4 GB RAM by using the VMMSSP.

• Users in the marketing department must be able to create new virtual machines that will be
hosted in the Toronto office. The virtual machine templates for the marketing department users
must be stored in the Toronto office.

###EndCaseStudy###

You need to configure VMM 2012 to meet the private cloud services requirements for the human
resources department users. What should you configure? (Each correct answer presents part of the
solution. Choose all that apply.)

PrepAway - Latest Free Exam Questions & Answers

A.
A cloud

B.
A capability profile

C.
A user role

D.
A virtual machine template

E.
A service template

Explanation:
(D)
*From scenario: Users in the human resources department must be able to create virtual machines
that have two CPUs and 4 GB RAM by using the VMMSSP.
* A virtual machine template is a library resource consisting of a guest operating system profile, a
hardware profile, and one or more virtual hard disks (VHDs), which can be used to create a new
virtual machine.
* (C) The concept of a role-based security model in SCVMM is to package security settings and
policies on who can do what, and how much on an object into a single concept, the so- called user

role. The idea of a user role is to define a job function which a user performs as opposed to simply
offering a logical group of selected user accounts.

2 Comments on “What should you configure?


Leave a Reply