Practice Test A 45 questions Flashcards

1
Q

Question 1 : Mark works as a network administrator for uCertify.com.

The company has a network that includes three servers that run Windows Server 2012.

This network has an Active Directory domain named ucertify.com.

ucertify.com includes an organizational unit named UC-OU01 that has a group policy associated with it.

Mark configures a remote Active Directory site that only hosts workstations and places the computer accounts of these workstations in UC-OU01.

The network of the workstations is divided into multiple subnets.

Mark wants to configure BranchCache for the remote site in such a way that it can minimize the WAN bandwidth used.

He has turned on the BranchCache feature.

Which of the following actions will he take next to accomplish the task?

Set BranchCache mode to the server cache mode.

Set BranchCache mode to the distributed cache mode.

Set BranchCache mode to the hosted cache mode.

Set BranchCache mode to the disabled cache mode.

A

Set BranchCache mode to the hosted cache mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 2 : Which of the following enables you to centralize print server and network printer management tasks?

Print and Document Service

Branch Office Direct Printing

Remote Desktop Service

Port mirroring

A

Print and Document Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 3 : You work as a network administrator for uCertify.com.

The company has Windows Server 2012 network-based infrastructure.

You are instructed to use clustering to achieve higher availability.

For this purpose, Windows Server 2012 provides two types of clustering.

Drag and drop the clustering type with its related statement.

Network Load Balancing

Failover clustering

Statements

This type of clustering is used for network-based services such as web and FTP servers.

This type of clustering is used for applications and services such as SQL Server and Exchange Server.

A

Explanation:
The following are the two types of clustering:
• Network Load Balancing: This type of clustering is used for network-based services such as web and FTP servers.
• Failover clustering: This type of clustering is used for applications and services such as SQL Server and Exchange Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 4 : Joseph works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network contains an Active Directory forest.

The forest functional level is Windows Server 2012. The forest contains a single domain named ucertify.com.

The domain contains a member server named UC-SRV01 that runs Windows Server 2012.

Joseph purchases a network scanner named UC-SC01 that supports Web Services on Devices.

He needs to share the UC-SC01 on UC-SRV01.

Which of the following features will he install in UC-SRV01 to accomplish the task?

File and Storage Services

Web Server

Fax Server

Print and Document Services

A

Print and Document Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 5 : John works as a System Administrator for uCertify Inc.
The company has a single-domain Active Directory network with multiple servers and client computers running Windows Server 2012 R2.

Management instructs John to conduct a training session for their junior system administrators. He needs to discuss about Windows NIC teaming.
Which of the following statements are true about Windows NIC teaming?
Each correct answer represents a complete solution.

Choose all that apply.

It enables multiple NICs on a server to be grouped together into a team.

It ensures availability by providing traffic failover in the event of a network component failure and to enable aggregation of network bandwidth across multiple NICs.

It is also known as load balancing and failover (LBFO).

It allows network adapters to distribute kernel-mode network processing across multiple processor cores in multicore systems.

A

It enables multiple NICs on a server to be grouped together into a team.

It ensures availability by providing traffic failover in the event of a network component failure and to enable aggregation of network bandwidth across multiple NICs.

It is also known as load balancing and failover (LBFO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 6 : You work as a System Administrator for uCertify Inc.

The company has a single-domain Active Directory network with multiple servers running Windows Server 2012 and client computers running Windows Server 2012.

The client computers are not PXE-enabled due to which they are not able to boot computers independently of data storage devices or installed operating systems.

Which of the following images will you use to install an operating system on these computers?

Discover

Capture

Install

Boot

A

Discover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 7 : You work as a System Administrator for uCertify.com.

The company has a single-domain network with multiple servers running Windows Server 2012.

The network has a Windows Server 2012 named UC-SERV01.

The UC-SERV01 server does not need the Windows Explorer, Internet Explorer, and all dependent components.

So, you decide to eliminate these components completely from this server.

Which of the following Windows PowerShell commands will you execute to accomplish the task?

Uninstall-WindowsFeature Server-Gui-Mgmt-Infra -Restart

Uninstall-WindowsFeature Server-Gui-Shell -Remove

Uninstall-SPSolution

Uninstall -WindowsFeature-Gui-Shell

A

Uninstall-WindowsFeature Server-Gui-Shell -Remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 8 : Mark works as a Network Administrator for uCertify Inc.

The company has an Active Directory-based network containing a Windows Server 2012 named UC-SRV01 and multiple clients running Windows 8.

While checking the network, Mark finds that Windows Explorer and Windows Internet Explorer are not working properly and performs a number of incomplete and unreliable downloads.

To resolve this issue, he needs to remove Windows Explorer, Windows Internet Explorer, and all related files from UC-SRV01 so that he can reduce the space requirements and enhance the performance of computers working on the network.

Which of the following commands will Mark use to accomplish the task?

Uninstall-WindowsFeature Server-Gui-Shell -Remove

Remove-NetLbfoTeam

del [/p] [/f] [/s] [/q] [/a[:]]

Remove-WindowsFeature name -restart

A

Uninstall-WindowsFeature Server-Gui-Shell -Remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 9 : Mark works as a Network Administrator for uCertify Inc.

The company has an Active Directory-based network containing a Windows Server 2012 server and multiple clients running Windows 8.

In the company, Mark is using storage space as a storage solution for business-critical deployments.

As per the current company’s situation, throughput is more important than the reliability of storage to gain more and more economical benefits and to fulfill the client’s requirements on time.

Which of the following storage layouts of storage space will help him accomplish the task?

Mirroring

Parity

No resiliency

Write-back cache

A

No resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 10 : Each iSCSI initiator and target must have a unique name.

What is the designation of this name?

WWN

MAC

iqn

SCSI ID

A

iqn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question 11 : You work as a System Administrator for uCertify Inc.

You have multiple remote locations connected to your main office by slow satellite links.

You want to install DNS onto these offices so that clients can locate authoritative DNS servers in the main location.

What type of DNS servers should be installed in the remote locations to accomplish the task?

Primary DNS zones

Secondary DNS zones

Active Directory Integrated zones

Stub zones

A

Stub zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question 12 : What type of domain controller would you install into an area where physical security is a concern?

Primary domain controller

Backup domain controller

Read-only domain controller

Locked-down domain controller

A

Read-only domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question 13 : You work as a network administrator for uCertify Inc.
The company has an Active Directory domain named ucertify.com.
The network contains twelve servers running Windows Server 2012.

One of the servers, named UC-DC01, is configured as a domain controller.
DNS is configured on UC-DC01 as shown in the image below:
Image of the DNS Manager dialog box with a lock displayed on the ucertify.com folder icon.

Figure A: DNS Manager window

What does the lock icon beside the zone node indicate?

The zone is signed with Domain Name System Security Extensions (DNSSEC).

The DNS server UC-DC01 is using IPSec connection for zone transfer.

The zone is locked for editing.

Type of the zone is configured as an Active Directory zone.

A

The zone is signed with Domain Name System Security Extensions (DNSSEC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 14 : Mark works as a Network Administrator for uCertify.com.

The company has a network with multiple servers running Windows Server 2012.

This network has a DNS server named UC-SERV01 with the network ID 10.1.1.0/24.

Mark has created several reverse lookup zones.

He needs to identify which reverse lookup zone is configured properly.

Which of the following options can Mark use to identify such zones?

  1. 10.1 in-addr.arpa
  2. 10.in-addr.arpa
  3. 1.1.in-addr.arpa
  4. 1.10.in-addr.arpa
A

1.1.10.in-addr.arpa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question 15 : Mark works as a System Administrator for uCertify.com.

The company’s network has an Active Directory domain.

The network has a standard primary zone named ucertify.com.

Based on the company’s security requirements, Mark needs to ensure that DNS records in the ucertify.com zone can be created only by the members of a group named UC-GRP01.

For this purpose, Mark is required to prevent all other users from creating, modifying, or deleting DNS records in the ucertify.com zone.

What should Mark do first to accomplish the task?

From the properties of the zone, change the zone type.

Run the new Delegation Wizard for the zone.

Run the Zone Signing Wizard for the zone.

From the properties of the zone, modify the Start Of Authority (SOA) record.

A

From the properties of the zone, change the zone type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question 16 : You work as a network administrator for uCertify Inc.

The company has an Active Directory domain named ucertify.com.

The network contains twelve servers running Windows Server 2012.

One of the servers, named UC-DC01, is configured as a domain controller.

DNS is configured on UC-DC01.

During a training session, a network administrator trainee asks you about the usage of Dnslint.exe tool.

What usage will you describe to her for the Dnslint.exe tool?

Each correct answer represents a complete solution.

Choose all that apply.

It verifies Domain Name System (DNS) records for a specified domain name.

It creates, adds, and deletes zones and resource records (RRs).

It diagnoses potential causes of incorrect delegation.

It administers the DNS Server service.

A

It verifies Domain Name System (DNS) records for a specified domain name.

It diagnoses potential causes of incorrect delegation.

It administers the DNS Server service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Question 17 : What command can you use to clear the Windows Server 2012 DNS server’s cache?

ipconfig /flushcache

dnscmd /flushcache

ipconfig /clearcache

dnscmd /clearcache

A

dnscmd /clearcache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Question 18 : Mark works as a Network Administrator for uCertify.com.

The company has a network that includes an Active Directory domain named ucertify.com and more than thousand clients running Windows Server 2012.

All of the clients connect to the Internet by using a web proxy.

Mark installs a server named UC-SEV01 that also runs Windows Server 2012.

Then, he installs the DNS server role on UC-SERV01.

During the installation of the DNS server role, UC-SERV01 was not connected to the Internet.

He then configures all of the clients to use UC-SERV01 as their primary DNS server.

He observes that UC-SERV01 and clients connected to it are not able to connect to the Internet.

Which of the following actions will he take on UC-SERV01 to accomplish the task?

Remove the root zone created on UC-SERV01.

Reinstall the DNS server role on UC-SERV01, but this time make sure that UC-SERV01 is connected to the Internet.

Configure root hint servers on UC-SERV01.

Configure forwarders on UC-SERV01.

A

Remove the root zone created on UC-SERV01.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Question 19 : Mark works as a network administrator for uCertify Inc.
The company has a single domain Active Directory network that consists of multiple servers running Windows Server 2012.

uCertify has a server named UC-SRV01 that is configured as a DHCP server.
Mark has created a superscope on UC-SRV01.

Why has Mark created the superscope?
Each correct answer represents a complete solution.

Choose two.

To support DHCP clients on a single physical network segment in which multiple logical IP networks are used

To support remote DHCP clients that are placed on the distant side of DHCP and BOOTP relay agents

To balance server loads and provide fault tolerance

To send network traffic to a group of endpoints destination hosts

A

To support DHCP clients on a single physical network segment in which multiple logical IP networks are used

To support remote DHCP clients that are placed on the distant side of DHCP and BOOTP relay agents

20
Q

Question 20 : You work as a network administrator for uCertify Inc.

The company has a single domain Active Directory-based network.

The network contains a domain named ucertify.com.

All servers on the domain run Windows Server 2012.

Automatic IP addressing is enabled on the network.

The DHCP relay agent is installed on a server on the network.

You are in discussion with your trainees with regard to automatic IP addressing.

A trainee asks you about the purpose of installing a DHCP relay agent on the network.

What is the function of a DHCP relay agent on the network?

It listens for DHCP messages on a network and forwards them to a DHCP server on another network.

It works as a replacement of a DHCP server in case the DHCP server is not available on the network.

It allows creating DHCP superscope.

It relays DHCP requests to a Dynamic DNS server.

A

It listens for DHCP messages on a network and forwards them to a DHCP server on another network.

21
Q

Question 21 : You work as a network administrator for uCertify.com.

The company has a Windows Server 2012 single Active Directory domain-based network.

All servers on the network run Windows Server 2012.

The network includes a server named UC-SRV01 that hosts the DHCP server role.

You are instructed to configure the DHCP server in such a way that the DHCP server does not issue any IP addresses that are already being used on the network.

What action will you take to accomplish the task with least performance impact?

Do nothing, DHCP does not provide duplicate IP address in any circumstances.

On the DHCP server, set the Conflict Detection Attempt value to 0.

On the DHCP server, set the Conflict Detection Attempt value to 4.

On the DHCP server, set the Conflict Detection Attempt value to 2.

A

On the DHCP server, set the Conflict Detection Attempt value to 2.

22
Q

Question 22 : You work as a network administrator for uCertify Inc.
The company has a single domain Active Directory-based network.
The network contains a domain named ucertify.com.
All servers on the domain run Windows Server 2012.

You are planning to implement DHCP failover architecture on your network.
You have decided to configure two DHCP servers as hot-standby partners.

Which of the following information are TRUE regarding hot-standby mode?
Each correct answer represents a complete solution.

Choose all that apply.

In this mode, an active server is responsible for leasing IP address and configuration data to all clients in a scope or subnet.

It is best suited for multi-site deployment topologies. Each site would have a local DHCP server which is configured to provide the DHCP service to the clients on the local network and DHCP server at a remote site would be a standby server.

It is more suited for single site deployment where the two DHCP servers in a failover relationship are co-located with the subnets/scopes being served by them.

In this mode, only one of the servers actively leases IP addresses.

A

In this mode, an active server is responsible for leasing IP address and configuration data to all clients in a scope or subnet.

It is best suited for multi-site deployment topologies. Each site would have a local DHCP server which is configured to provide the DHCP service to the clients on the local network and DHCP server at a remote site would be a standby server.

In this mode, only one of the servers actively leases IP addresses.

23
Q

Question 23 : You work as a System Administrator for uCertify Inc.

You have two trees in your forest. Each tree has only one domain, named uCertify1.com and uCertify2.com.

Both domains are set to the Windows Server 2003 function level.

Based on the company’s security policy, you need to enable Kerberos AES encryption for each of the domains.

What do you need to do as a minimum to accomplish the task?

Raise just the uCertify2.com domain function level to Windows Server 2003 R2.

Raise both forest function levels to Windows Server 2003.

Raise both domain function levels to Windows Server 2008 R2.

Create a new trust between both domains.

A

Raise both domain function levels to Windows Server 2008 R2.

24
Q

Question 24 : Mark works as a Network Administrator for uCertify.com.

The company has a single domain network with multiple servers running Windows Server 2012.

This network has a server named UC-DC-01 that acts as a domain controller and runs Server Core Installation of Windows Server 2012.

UC-DC-01 is not performing up to the level. Mark decides to promote another server UC-DC-02 as a domain controller.

So, he removes the UC-DC-01 server from the network without uninstalling it properly.

But, then he finds that the metadata of UC-DC-01 is left behind on the network.

He wants to remove it.

Which of the following cmdlets will Mark execute to accomplish the task?

Remove-ADComputer

ntdsutil. exe
dsamain. exe

Remove-WindowsFeature

A

ntdsutil.exe

25
Q

Question 25 : Jerry works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network has a server named UC-SRV01 which has the File server role installed that runs Windows Server 2012.

Jerry creates a document named UC-DOC01 on UC-SRV01. The UC-DOC01 will contain the files and folders of all users.

He needs to ensure that when the users connect to UC-DOC01, they only see the files to which they have access.

Which of the following settings will be enabled by Jerry to accomplish the task?

Access-based enumeration

RD Gateway Manager

Server Core

Failover Clustering

A

Access-based enumeration

26
Q

Question 26 : Mark works as a Server Manager for uCertify Inc.

The company has a Windows Server 2012 domain-based network.

Mark creates a new quota template and applies the quotas to 123 folders by using this template.

Now he wants to modify the quota settings for all those folders.

Which of the following actions will Mark take to accomplish the task?

Delete and recreate the quota template.

Create a file screen template.

Create a hard quota template.

Modify the quota template.

A

Modify the quota template.

27
Q

Question 27 : Which of the following statements are true about printer pooling?
Each correct answer represents a complete solution.

Choose all that apply.

Associates two or more identical printers with one set of printer software.

All printers in the pool are the same model.

Printer ports can be of the same type or mixed (parallel, serial, and network).

All printers should be in different locations.

A

Associates two or more identical printers with one set of printer software.

All printers in the pool are the same model.

Printer ports can be of the same type or mixed (parallel, serial, and network).

28
Q

Question 28 : Mark works as a System Administrator for uCertify.com.

The company has a network with a server named UC-SERV running a Server Core installation of Windows Server 2012.

UC-SERV has been configured to get an IPv4 address by using DHCP.

Mark needs to create an IP address object for UC-SERV and configure settings for this address.

Which of the following cmdlets will he execute to accomplish the task?

Get-NetIPAddress

Set-NetNeighbor

Set-NetIPInterface

New-NetIPAddress

A

New-NetIPAddress

29
Q

Question 29 : Which of the following statements is true regarding the actions that occur when a software package is removed from a GPO that is linked to an OU?

The application will be automatically uninstalled for all users with the OU.

Current application installations will be unaffected by the change.

The system administrator may determine the effect.

The current user may determine the effect.

A

The system administrator may determine the effect.

30
Q

Question 30 : Mark works as a System Administrator for uCertify.com.

The company has multiple domain networks with hundred workstations running Windows Server 2012.

Mark has created a GPO named UC-GPO-01.

He wants to apply it to the groups and accounts that span multiple domains.

So, he needs to create a group to link UC-GPO-01.

Which of the following groups will he create to accomplish the task?

Global

Domain local

Universal

Built-in

A

Universal

31
Q

Question 31 : John works as a System Administrator for uCertify Inc.

The company has a single-domain Active Directory network with multiple servers and client computers running Windows Server 2012 R2.

John has installed a new Windows Server 2012 R2 named UC_01.

Management instructs John to execute the djoin.exe command on a server named UC_01.

What is the reason to execute this command?

It creates, modifies, and deletes directory objects.

It provisions a computer account in a domain and requests an offline domain to join when a computer restarts.

It imports and exports data from Active Directory Domain Services (AD DS) using files that store data in the comma-separated value (CSV) format.

It configures DFS folders and folder targets in a DFS namespace.

A

It provisions a computer account in a domain and requests an offline domain to join when a computer restarts.

32
Q

Question 32 : Mark works as a System Administrator for uCertify.com.

The company has a network that includes a server named UC-SERV01 running Windows Server 2012.

Several users connected to the server UC-SERV01 are from the administrator group.

Mark needs to ensure that all local administrators are able to receive User Account Control (UAC) prompts when they run a Microsoft Management Console.

Which of the following policies will Mark modify to accomplish the task?

Local

DHCP

Audit

User Rights Assignment

A

Local

33
Q

Question 33 : Mark works as a System Administrator for uCertify.com.

The company has a multiple domain network with multiple servers running Windows Server 2012.

This network includes a domain server named UC-DOMAIN-SERV01.

Group Policy settings for a user are generally cumulative and inherited from GPOs assigned at the site level, at the domain level, and at the OU level.

Mark has applied GPO settings to all users within the domain UC-DOMAIN-SERV01 at the domain level.

But, Mark does not want to apply these settings to an object residing in this domain.

Which of the following actions will Mark take on the object to accomplish the task?

Enable the Enforced option in the GPO settings.

Enable the Block Inheritance option in GPO settings.

Disable the Enforced option in the GPO settings.

Disable the GPO Status option in GPMC.

A

Enable the Block Inheritance option in GPO settings.

34
Q

Question 34 : The process of assigning permissions to set Group Policy for objects within an OU is known as which of the following?

Promotion

Inheritance

Delegation

Filtering

A

Delegation

35
Q

Question 35 : Mark is hired as a System Administrator for uCertify.com.

This company has a network with multiple servers running Windows Server 2012.

The director of the company complains that he continues to have a desktop wallpaper that he did not choose.

When Mark analyzes the system, he finds out that a former System Administrator created 20 GPOs and one of these GPOs is changing the director’s desktop wallpaper.

Now, he needs to figure out which GPO is doing this.

Which of the following actions will he take to accomplish the task?

Execute the RSoP utility against all forest computer accounts.

Execute the RSoP utility against the director’s computer account.

Execute the RSoP utility against the director’s user account.

Execute the RSoP utility against all domain computer accounts.

A

Execute the RSoP utility against the director’s user account.

36
Q

Question 36 : Members of which of the following groups have permissions to perform actions in multiple domains?

Domain Admins

Domain Users

Administrators

Enterprise Admins

A

Enterprise Admins

37
Q

Question 37 : Mark works as a System Administrator for uCertify.com.

The company has a network with a single server named UC-SERV running Windows Server 2012.

The company has a department named Marketing.

Mark has created an OU named MarketingOU for this department on the server.

MarketingOU includes many folders.

A folder named Finance contains critical information regarding bills and dues of the company.

Mark suspects that someone is trying to hack into this folder.

So, he decides to audit the folder.

Which of the following auditing events will he execute to accomplish the task?

Audit Account Management

Audit Logon Events

Audit Object Access

Audit Directory Service Access

A

Audit Object Access

38
Q

Question 38 : Mark works as a Network Administrator for uCertify Inc.

The company’s network consists of a remote office with 3000 client computers on a single subnet.

Based on the company’s general guidelines, Mark is required to configure a subnet mask for the network that will support all of the client computers.

The solution must minimize the wastage of IP addresses.

Which of the following subnet masks will Mark configure to accomplish the task?

  1. 255.240.0
  2. 255.254.0
  3. 255.255.0
  4. 255.255.128
A

255.255.240.0

39
Q

Question 39 : Which network protocol can Windows Server 2012 route?

TCP

NetBEUI

LAT

IP

A

IP

40
Q

Question 40 : Given the IPv6 address 2001:0DB8:0000:0000:0000:BEE0:0000:1234, what would be the appropriate condensed IPv6 address displayed if entered as an interface address on Windows Server 2012?

2001: DB8::BEE0:0:1234
2001: 0DB8::BEE:0:1234
2001: DB8::BEE:0:1234
2: :1:DB8:0:0:0:BEE0:1234
2001: DB8::BEE0::1234

PAT with Traversal on your host machines

A

2001:DB8::BEE0:0:1234

41
Q

Question 41 : Jerry works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network has a domain controller named UC-DC01.

The domain contains a server named UC-SRV01 that runs Windows server 2012 and has the Hyper-V server role installed.

Jerry configures a virtual machine named UC-VM01. UC-VM01 has a snapshot.

Based on the company’s requirement, Jerry needs to modify the Snapshot File Location of UC-VM01.

What should he do first?

Delete the snapshot.

Copy the snapshot.

Pause UC-VM01.

Resume UC-VM01.

A

Delete the snapshot.

42
Q

Question 42 : John works as a System Administrator for uCertify Inc.
The company has a single-domain Active Directory network that has a Windows Server 2012 R2 server named UC_01 that runs the Hyper-V server role.

Management instructs John to discuss about VHDX with their junior system administrators.
Which of the following statements are true about VHDX?
Each correct answer represents a complete solution.

Choose all that apply.

It provides virtual disk size of up to 64 TB.

It provides data block size of up to 256 MB.

It provides logical sector size of up to 4 MB.

It provides data corruption protection.

A

It provides virtual disk size of up to 64 TB.

It provides data block size of up to 256 MB.

It provides data corruption protection.

43
Q

Question 43 : You work as a network administrator for uCertify.com.

The company has a single domain Active Directory network.

All servers on the network run Windows Server 2012.

The network consists of multiple servers running Hyper-V server role.

The network includes a domain controller named UC-DC01. UC-DC01 hosts a virtual machine.

You are instructed to move the virtual hard disks of the virtual machine hosted by UC-DC01 to a physical disk on a different server.

You are also instructed to perform this action without taking the virtual server offline.

What will you do to accomplish this task?

Use storage migration.

Use network-based migration.

Use quick migration.

Use san migration.

A

Use storage migration.

44
Q

Question 44 : What is a legacy network adapter in Hyper-V?

A virtual network adapter that can be configured when the Hyper-V Integration Components are installed

A virtual network adapter that can connect to the virtual networks

A virtual network adapter that you need in order to boot from the network

A virtual network adapter that connects your virtual machine to the host machine

A

A virtual network adapter that you need in order to boot from the network

45
Q

Question 45 : Jenifer works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network has a domain controller named UC-DC01. The UC-DC01 contains a server named UC-SRV01 that runs Windows Server 2012.

UC-SRV01 has a Hyper-V server role installed.

The domain contains a virtual machine named UC-VM01.

A software developer wants to attach a debugger to UC-VM01.

Jenifer needs to ensure that the software developer can connect to UC-VM01 by using a named pipe.

Which of the following virtual machine settings will she configure?

BIOS

Network Adapter

COM

Processor

A

COM