Practice Test MCSA:Installation ,Storage and Compute 70-740 Flashcards

1
Q

You are the administrator for your company network. You have a Windows Server 2016 server.
What should you install if you want to configure the server as a multitenant RAS Gateway? A. Data Center Bridging feature
B. Network Controller server role
C. Network Policy and Access Services server role
D. Remote Access server role

A

D. The Remote Access server role provides connectivity through DirectAccess, VPNs, and Web Application Proxies (WAPs). DirectAccess provides an Always On and Always Man- aged experience. Remote Access provides VPN access, including site-to-site connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are the administrator for your company network. You have just installed Windows Server 2016 on a new server. It is essential that you activate Windows Server. Which of the following command-line tools can be used to activate Windows Server?
A. Cscript C:\windows\system32\slmgr.vbs -ato
B. Ocsetup C:\windows\system32\slmgr.vbs -ato C. Netdom C:\windows\system32\slmgr.vbs -ato
D. Netsh C:\windows\system32\slmgr.vbs -ato

A

A. The correct answer is Cscript C:\windows\system32\slmgr.vbs –ato. Cscript will start a script so that it runs in a command-line environment. The –ato parameter command prompts Windows to try to do an online activation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
You are the administrator for your company network. With Nano Server some packages are installed directly with their own PowerShell switches (such as -Compute), whereas others are installed by passing package names using the -Packages parameter that can combine in a comma-separated list. If you want to add Internet Information Services (IIS) to your Nano Server, what command should you use?
A. -Compute
B. -Containers 
C. -Packages 
D. -Storage
A

C. You can install the Internet Information Services (IIS) server role on Nano Server by using -Packages Microsoft-NanoServer-IIS-Package. The NanoServer folders contain a .wim image and a subfolder called Packages. The Packages subfolder is needed when you want to add server roles and features to the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are the administrator for your company network. You have a Windows Server 2016 Nano Server machine with no packages installed. You decide to attach a new disk. You also plan to initialize the disk as a GUID Partition Table (GPT) disk. First you want to create a ReFS-formatted volume on the new disk. What should you do?
A. From the physical server, log on to the Nano Server Recovery Console.
B. Install the Microsoft-NanoServer-Host-Package package.
C. Install the Microsoft NanoServer-Storage-Package package.
D. Run the Format-Volume cmdlet and specify the -FileSystem switch.

A

D. The Format-Volume cmdlet formats one or more existing volumes or a new volume on an existing partition, and the –FileSystem switch specifies the filesystem with which to format the volume. The acceptable values for this parameter are NTFS, ReFS, exFAT, FAT32, and FAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are the administrator for your company network. You have two Windows Server 2016 servers named ServerA and ServerB, and there is a firewall between the two servers. Both servers run Windows Server Update Services (WSUS). ServerA downloads updates using Windows Update. What port should be open on the firewall if ServerB must synchronize updates from ServerA?
A. 80 B. 443 C. 3389 D. 8530

A

D. By default, Windows Firewall will be running on the WSUS server; when you installed WSUS, it automatically configured two inbound rules called WSUS that allow both ports TCP 8530 and 8531.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are the administrator for your company network. Your network contains an Active Directory domain. There is a company policy in place that states that new servers should run Nano Server whenever possible. What server role can be deployed on a Nano Server?
A. Active Directory Domain Services (AD DS) B. DHCP Server
C. Network Policy and Access Services
D. Web Server (IIS)

A

D. A Nano Server cannot run Active Directory Domain Services (AD DS), Network Policy and Access Services, or a DHCP server. The recommended role is IIS Web Server. The Web Server (IIS) role in Windows Server 2016 allows an administrator to set up a secure, easy- to-manage, modular, and extensible platform for reliably hosting websites, services, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are the administrator for your company network. You have a Windows Server 2016 server named ServerA. The server has an application named AppA, which writes entries to the Application event log when errors are encountered. The events have IDs of either 111 or 112.
You want to restart the service whenever one of these events is logged. What should you do?
A. Create a custom view that has a filter for the event IDs from Event Viewer.
B. Run the Get-SMServerEvent cmdlet and pipe the output to the Start-NetEvent using
PowerShell.
C. Run the Write-Eventlog cmdlet and specify the -EventID parameter using PowerShell.
D. Use Create Task to create one task that includes triggers for both event IDs from Task Scheduler.

A

C. The Write-EventLog cmdlet writes an event to an event log. To write an event to an event log, the event log must exist on the computer and the source must be registered for the event log. The –EventID switch specifies the event identifier. This parameter is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are the administrator for your company network. You have a Windows Server 2016 server named ServerA, which has Windows Defender enabled. ServerA runs an applica- tion named AppA that stores different types of files in Microsoft OneDrive and Microsoft SharePoint Online. AppA also interacts with several local services. You need to prevent Windows Defender from scanning any files opened by AppA. What should you do on ServerA?
A. Configure a process exclusion in the Windows Defender settings. B. Modify the real-time protection settings in Windows Defender.
C. Modify the cloud-based protection settings in Windows Defender.
D. Run the New-AppLockerPolicy cmdlet

A

C. Windows Defender offers improved security using cloud-based antivirus protection. When enabled, Windows Defender sends information to Microsoft about any problems it finds. This information is then used to gather more information about the problems affect- ing you and other users. This can be enabled and disabled. The cloud-based protection is also turned on by default and it provides real-time protection when Windows Defender sends information to Microsoft about potential security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are the administrator for your company network. You have a Windows Server 2016 server named ServerA. The Windows Server 2016 installation media is mounted as Drive E. You copy the NanoServerImageGenerator folder from the E:\NanoServer folder to the C:\NanoServer folder. You create a custom Nano Server image that includes the Hyper-V server role. What two commands should you run if you want this image to be used to deploy Nano Servers to physical servers? (Choose two.)
A. New-NanoServerImage –Edition Standard –DeploymentType Guest –MediaPath E:-TargetPath \NanoServerImage\NanoServer.wim -Compute
B. Install-PackageProvider NanoServerPackage
C. Import-PackageProvider NanoServerPackage
D. New-NanoServerImage –Edition Standard –DeploymentType Host –MediaPath E:\ -TargetPath \NanoServerImage\NanoServer.wim -Compute
E. Import-Module C:\NanoServer\NanoServerImageGenerator

A

D, E. You must import the module for NanoServerImage generation, and then use the New-NanoServerImage command to create the new image. The New-NanoServerImage cmdlet makes a local copy of the necessary files from the installation media and converts the included Nano Server Windows image (.wim) file into a VHD or VHDX image, or reuses the existing .wim file. It then makes a copy of the converted VHD or VHDX image in the specified path. The -Edition parameter specifies the edition of the operating system. Valid values are Standard and Datacenter. The -DeploymentType parameter specifies the type of Nano Server deployment image. Valid values are Guest and Host. The -MediaPath parameter specifies the path of the source media. The -TargetPath parameter specifies the path of the final, modified image. The -Computer parameter indicates that this operation adds the Compute package. The Import-Module cmdlet adds one or more modules to the current session. The modules that you import must be installed on the local computer or a remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Youaretheadministratorforyourcompanynetwork.Yourcompanyhastwomainoffices. One is located in Atlanta and the other in Dallas. All servers at both locations run Windows Server 2016. In the Dallas office, there is a Distributed File System (DFS) server named DFS1. DFS1 has a folder named FolderA that contains large Windows image files. In the Atlanta office, you deploy a DFS server named DFS2, and you then replicate FolderA to DFS2. After several days, you notice that the replication of certain files failed to complete. What should you do if you need to ensure that all of the files in FolderA can replicate to DFS2?
A. Create a quota for FolderA using File Server Resource Manager (FSRM). B. Modify the disk quota on the drive that contains FolderA.
C. Modify the size of the staging area on FolderA.
D. Run dfsutil /purgemupcache from a command prompt.

A

C. Distributed File System Replication (DFSR) staging is a hard drive area that is used for files that need to be replicated from one DFS server to other DFS servers. If the files that you are trying to replicate are larger than your assigned staging area, the replication will fail. When this happens, you must increase the amount of space used in the staging area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are the administrator for your company network. You have a Windows Server 2016 server named ServerA. The server contains a storage pool named PoolA. PoolA contains five physical disks named DiskA, DiskB, DiskC, DiskD, and DiskE. A virtual disk named VD1 is stored in PoolA. VD1 uses the parity storage layout. Which two commands should you run if you need to remove DiskC after it fails from PoolA? (Choose two.)
A. Set-PhysicalDisk-FriendlyName DiskC -Usage Retired
B. Set-ResiliencySetting-StoragePool PoolA-PhysicalDiskRedundancyDefault 4 C. Remove-PhysicalDisk-FriendlyName DiskC
D. Update-StoragePool-FriendlyName PoolA
E. Reset-PhysicalDisk-FriendlyName DiskC

A

B, C. The Remove-PhysicalDisk cmdlet removes a physical disk from a specified storage pool. The Set-ResiliencySetting cmdlet modifies the properties of the specified resil- iency setting name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are the administrator for your company network. You have two Windows Server 2016 servers named ServerA and ServerB. ServerA contains a volume named Vol1. You decide to implement a Storage Replica that replicates the content of Vol1 from ServerA and ServerB. One day, ServerA fails. You need to ensure that you can access the contents of Vol1. What should you run from ServerB?
A. Clear-FileStorageTier B. Set-SRPartnership
C. Update-StoragePool
D. vssadmin revert shadow

A

B. The Set-SRPartnership command modifies a replication partnership between two rep- lication groups. You can use this cmdlet to add replicated volumes, and you can also change the direction of replication, which makes a source volume into a destination volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are the administrator for your company network. The network contains an Active Directory domain. The domain contains a new file server named ServerA that runs a Server Core installation of Windows Server 2016. ServerA has an ReFS-formatted volume D: and NTFS-formatted volume E:. The volumes do not contain any data. You install the Data Deduplication role service on ServerA. What PowerShell cmdlet should you run if you want to implement Data Deduplication for volumes on D: and E:?
A. Format-Volume D: -FileSystem EXFat and Enable-DeDupVolume -Volume D:,E: B. Format-Volume E: -FileSystem ReFS and Enable-DeDupVolume -Volume D:,E: C. Enable-DeDupVolume-Volume D:,E:
D. Enable-DeDupVolume-Volume E: D:

A

B. The Format-Volume cmdlet formats one or more existing volumes, or a new volume on an existing partition. This cmdlet returns the object representing the volume that was just formatted, with all properties updated to reflect the format operation. The Enable-DeDupVolume cmdlet enables Data Deduplication on one or more volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are the administrator for your company network. The network contains an Active Directory domain. The domain contains two servers named ServerA and ServerB, each with the same hardware configuration. You need to asynchronously replicate volume E: from ServerA to ServerB. What should you do?
A. Install the Failover Clustering feature and create a new cluster resource group. B. Install the Failover Clustering feature and use Cluster Shared Volumes (CSV). C. Run New-SRPartnership and specify the –ReplicationMode parameter.
D. Run Set-DfsrServiceConfiguration and specify the –RPCPort parameter.

A

C. The New-SRPartnership cmdlet creates a replication partnership between two new or existing replication groups. This cmdlet can create the complete replication topology. It can also tie together separately created replication groups. The -ReplicationMode parameter specifies the desired mode of replication for this source and destination pair. The acceptable values for this parameter are:
■■ Synchronous or 1—The synchronous mode requires all writes to commit on the destina- tion server and on the source server, which guarantees data integrity between computers. This is the default value.
■■ Asynchronous or 2—The asynchronous mode writes to the source server without wait- ing for the destination server, which allows for replication over high-latency, geographic networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
You are the administrator for your company network. You have client computers that run Windows Server 2016. Each computer has two hard drives. Which kind of volume should you create if you need to create a dynamic volume on each computer that will maximize write performance as well as provide data fault tolerance?
A. Mirrored volume 
B. RAID 5 volume 
C. Spanned volume 
D. Striped volume
A

A. A mirrored volume duplicates data across two disks. This type of volume is fault toler- ant because if one drive fails, the data on the other disk is unaffected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
You are the administrator for your company network. You want to remove the host from the iSNS server. What command should you use to remove the host?
A. iscsicli addisnsserver 
B. iscsicli listisnsservers  
C. iscsicli refreshisnsserver  
D. iscsicli removeisnsserver
A

D. The iscsicli removeisnsserver command removes the host from the iSNS server. The iscsicli addisnsserver command manually registers the host server to an iSNS server. refreshisnsserver refreshes the list of available servers. listisnsservers lists the available iSNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are the administrator for your company network. A user, Sandy, is a member of both the Human Resources and Marketing departments. There is a shared folder called App1 that everyone uses. The current permissions on the App1 shared folder are:

Group/User. NTFS Shared
Sales Read Deny
Marketing Modify Full Control
R&D. Read Read
Human Resources Full Control Deny
Admin Full Control Change

What will Sandy’s local and remote permissions be when she logs into the App1 folder?
A. Local = Full Control and Remote = Deny
B. Local = Deny and Remote = Deny
C. Local = Full Control and Remote = Change
D. Local = Change and Remote = Read

A

A. Permissions are additive among themselves. This means you get the highest level of per- missions. But when the two permissions meet, the most restrictive set of permission applies. In this question, the NTFS side would be Full Control (this would be the local permission) and the Shared permission would be Deny. But when the two permissions meet, the most restrictive, Deny, would apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
You are the administrator for your company network. You have a computer that has a 1 TB volume named D. What tool should you use if you want to receive a notification when the volume has less than 100 GB of free space left?
A. Disk Cleanup
B. Event Viewer
C. Performance Monitor
D. Resource Monitor
E. System Configuration
A

C. The Microsoft Windows Performance Monitor is a tool that administrators can use to examine how programs running on their computers affect the computer’s performance. The tool can be used in real time and can also be used to collect information in a log to analyze the data at a later time. With Performance Monitor, you can set up counter logs and alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are the administrator of your company network. You have a computer that runs Windows Server 2012 R2. You create a system image backup on the computer and then upgrade to Windows Server 2016. You need to access a file from the backup. Your solution must use the least amount of administrative effort. What should you do?
A. From the Backup section of the Settings app, add a drive.
B. From the File History section of the Settings app, add a drive.
C. From the Computer Management console, attach a VHD.
D. From the File History Control Panel item, restore the personal files.

A

C. Virtual Hard Disk (VHD) is a file format that represents a virtual disk drive. A VHD can be used to store virtual disk data in files that can be easily transferred from one com- puter to another. It contains what is found on a physical HDD, such as disk partition and filesystem. Once attached, they can be treated like physical disks and you can use them to store data. To attach the VHD, you would use the Computer Management console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are the administrator for your company network. You decide to purchase a new com- puter that has four external USB hard drives. You want to create a single volume by using all the USB drives. You want the volume to be expandable, portable, and resilient in the event of failure of an individual USB hard drive. What should you do so you can create the required volume?
A. Create a new spanned volume.
B. Create a new striped volume.
C. Create a new Storage Space across the four USB hard drives and set the resiliency type to three-way mirror.
D. Create a new Storage Space across the four USB hard drives and set the resiliency type to parity

A

D. Storage Spaces can combine multiple hard drives into a single virtual drive. To create a Storage Space, you need to connect two or more internal or external drives to the computer to create a storage pool. When the drive begins to fill up and nears the physical limit, Win- dows will display a notification prompting you to add additional physical Storage Space. Selecting the Parity resiliency type allows Windows to store parity information with the data, thereby protecting you from a single drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are the administrator for your company network. You have a Windows Server
2016 Hyper-V host that has a dynamically expanding virtual hard disk (VHD) file that is 950 GB. The VHD currently contains about 450 GB of free space. What cmdlet should you use if you want to reduce the amount of disk space used by the VHD?
A. DiskPart.exe
B. Mount-VHD
C. Optimize-VHD
D. Set-VHD

A

C. The Optimize-VHD cmdlet allows an administrator to optimize the allocation of space in virtual hard disk files, except for fixed virtual hard disks. The Compact operation is used to optimize the files. This operation reclaims unused blocks as well as rearranges the blocks to be more efficiently packed, which reduces the size of a virtual hard disk file.

22
Q

You are the administrator for your company network. Your network contains an Active Directory forest. You install Windows Server 2016 on 10 virtual machines. What should you do if you need to deploy the Web Server (IIS) server role identically to the virtual machines?
A. Create an answer file, copy the file to C:\Sysprep on each virtual machine, and then run the Apply-Image cmdlet using Windows System Image Manager.
B. Create an application control policy and then apply the policy to the virtual machines from a Group Policy Object (GPO).
C. Create a default configuration and then apply the configuration to the virtual machines using PowerShell Desired State Configuration (DSC).
D. Create a software installation package and then publish the package to the virtual machines using a Group Policy Object (GPO)

A

C. Desired State Configuration (DSC) is an important part of the configuration, manage- ment, and maintenance of Windows Server 2016. Using a PowerShell script specifies the configuration of the machine using a standard way that is easy to maintain and understand.

23
Q

You are the network administrator for your company network. You are looking at the dif- ferent types of hard disks that are available when using Hyper-V. One type of disk starts with a small VHD file and expands it on demand once an installation takes place. What type of hard disk is being described?
A. Differencing disk
B. Dynamically expanding disk C. Fixed-sized disk
D. Physical (or pass-through) disk

A

B. Dynamically expanding is a disk that starts with a small VHD file and expands on demand once an installation takes place. It can grow to the maximum size you define dur- ing creation. You can use this type of disk to clone a local hard drive during creation.

24
Q

You are the administrator for your company network. You are planning the configuration of a virtual network switch for your Hyper-V network that will contain several Hyper-V hosts. ServerA will have 10 virtual machines that must be able to communicate with one another. The virtual machines must be prevented from communicating with ServerA and
all other servers on the corporate network. The Hyper-V network will also have a two-node failover cluster named ClusterA that will have 20 virtual machines. The virtual machines will run on both nodes. Hyper-V hosts on the corporate network must be able to connect
to the virtual machines. What type of virtual switch should you select for the 20 virtual machines on ClusterA?
A. External
B. Internal
C. Private
D. Public

A

A. When you use the External Virtual Switch type, any virtual machine connected to this virtual switch can access the physical network. This option is used in production environ- ments where your clients connect directly to the virtual machines. This question states that Hyper-V hosts on the corporate network must be able to connect to the virtual machines.

25
Q

You are the administrator for your company network. You have an application that is dis- tributed to multiple Hyper-V virtual machines in a multitenant environment. You need to ensure that the traffic is distributed evenly among the virtual machines that host the application. What should you include in the environment?
A. A Network Controller and Windows Server Network Load Balancing (NLB) nodes
B. A Network Controller and Windows Server Software Load Balancing (SLB) nodes
C. A RAS Gateway and Windows Server Network Load Balancing (NLB) nodes
D. A RAS Gateway and Windows Server Software Load Balancing (SLB) nodes

A

D. By using a RAS Gateway and Windows Server Software Load Balancing (SLB), you can scale out your load balancing capabilities using SLB VMs on the same Hyper-V compute serv- ers that you use for your other virtual machine workloads. Multitenancy for VLANs is not supported by Network Controller; however, you can use VLANs with SLB for service provider managed workloads, such as the datacenter infrastructure and high-density web servers.

26
Q

You are the administrator for your company network. You have a Windows Server 2016 Hyper-V host named ServerA that hosts a virtual machine named VM-1. You install the Hyper-V server role on VM-1. You need to ensure that the virtual machines hosted on VM-1 can communicate with the virtual machines hosted on ServerA. What should you do?
A. Run the Set-VmNetworkAdapterIsolation cmdlet and specify the -MultiTenantStack Off parameter on ServerA.
B. Run the Set-VMNetworkAdapter cmdlet and specify the -MacAddressSpoofing Off parameter on VM-1.
C. Run the Set-VmNetworkAdapterIsolation cmdlet and specify the -MultiTenantStack On parameter on VM-1.
D. Run the Set-VMNetworkAdapter cmdlet and specify the -MacAddressSpoofing On parameter on ServerA.

A

C. The Set-VmNetworkAdapterIsolation cmdlet modifies isolation settings for a virtual network adapter. You can isolate a virtual machine adapter by using a virtual local area network (VLAN), Hyper-V Network Virtualization, or a third-party virtualization solu- tion. You can specify the isolation method and modify other settings, which include mul- titenancy settings. The -MultiTenantStack parameter specifies whether to use multiple isolation IDs for the virtual machine. The acceptable values for this parameter are: On, indicate isolation IDs so that the virtual machine provides services to multiple tenants on different isolation subnets, and Off, do not indicate isolation IDs to the virtual machine.

27
Q

You are the administrator for your company network. Your network contains an Active Directory domain that contains a Windows Server 2016 Hyper-V host named ServerA. ServerA hosts four machines that are members of the domain. The virtual machines are configured as shown:

Machine Name Operating System Virtual Machine Generation Type of VHD File
VM-1 Windows 10 2 VHD
VM-2 Windows Server 2016 2 VHD
VM-3 Windows Server 2012 R2 2 VHDX
VM-4 Windows Server 2016 1 VHDX

What virtual machines can you manage by using PowerShell Direct?
A. Only VM-2
B. VM-1, VM-2, and VM-4
C. Only VM-4
D. VM-1, VM-2, and VM-3
A

B. PowerShell Direct is a feature for Windows 10 and Windows Server 2016. The virtual machine generation or VHD type do not matter. It is a way of running PowerShell com- mands inside a virtual machine from the host operating system. To create a PowerShell Direct session on a virtual machine:
■■ The VM must run at least Windows 10 or Windows Server 2016.
■■ The VM must be running locally on the host and booted.
■■ You must be logged into the host computer as a Hyper-V administrator.
■■ You must supply valid user credentials for the virtual machine.
■■ The host operating system must run at least Windows 10 or Windows Server 2016.

28
Q

Youaretheadministratorforyourcompanynetwork.YouhaveaWindowsServer2016server named ServerA, which is a Hyper-V host that hosts a virtual machine named VM-1. ServerA has three network adapter cards that are connected to virtual switches named vSwitch-1, vSwitch-2, and vSwitch-3. You configure NIC Teaming on VM-1. The team name is VM1- NIC-Team. Added to the team are Ethernet2, which is 10 Gbps, and Ethernet3, which is
10 Gbps. The teaming mode is Switch Independent. You need to ensure that VM-1 will retain access to the network if a physical adapter card fails on ServerA. What should you do?
A. Add the adapter named Ethernet to the NIC team from the properties of the NIC team on VM-1.
B. Modify the settings on VM-1 from Hyper-V Manager on ServerA.
C. Run the Set-VmNetworkAdapterTeamMapping cmdlet on VM-1.
D. Run the Set-VmNetworkAdapterFailoverConfiguration cmdlet on ServerA.

A

B. Nic Teaming allows you to group from 1 to 32 physical ethernet adapters
into one or more software-based virtual network adapters. These virtual network adapters provide fast performance and fault tolerance in the event of a network adapter failure. NIC Team member network adapters must all be installed in the same physical host computer to be placed in a team. In this case, you would modify the settings on VM-1 from Hyper-V Manager on ServerA.

29
Q

You are the administrator for your company network. You have a Windows Server 2016 Hyper-V host named ServerA that has a virtual disk file named DiskA.vhdx which contains an installation to Windows Server 2016. You create a virtual disk file named DiskB.vhdx that is configured as shown:
PS: c:\ Get-VHD Path C:\folder1\DiskB.vhdx ComputerName: SERVERA
Path: c:\folder1\diskB.vhdx
VhdFormat: VHDX

What command should you run if you want to move DiskA.vhdx to C:\Folder2, you will be able to use DiskB.vhdx only after you run which of the following commands
A. Merge-VHD
B. Optimize-VHD C. Set-VHD
D. Test-VHD

A

A. The Merge-VHD cmdlet merges virtual hard disks in a differencing virtual hard disk chain. The merge is from a specified source child disk to a specified destination child disk. Merge is an offline operation; the virtual hard disk chain must not be attached when the merge is initiated.

30
Q

You are the administrator for your company network. You have a Windows Server 2016 computer named ServerA that has the Hyper-V feature installed. ServerA hosts a virtual machine named VM-1. VM-1 runs Windows Server 2016 and connects to a private virtual network switch. You need to remotely execute PowerShell cmdlets on VM-1. What should you do from ServerA?
A. Run the winrm.exe command and specify the -s parameter.
B. Run the Powershell.exe command and specify the -Command parameter. C. Run the Receive-PSSession cmdlet and specify the -Name parameter.
D. Run the Invoke-Command cmdlet and specify the -VMName parameter.

A

D. An administrator can use PowerShell Direct to run PowerShell cmdlets on a virtual machine from the Hyper-V host. Because Windows PowerShell Direct runs between the host and virtual machine, there is no need for a network connection or to enable remote management. There are no network or firewall requirements or special configuration. To create a PowerShell Direct session, use one of the following commands:
Enter-PSSession -VMName VMName
Invoke-Command -VMName VMName -ScriptBlock { commands }

31
Q
You are the administrator for your company network. You have a Windows Server 2016 Hyper-V server named ServerA that has an IP address of 192.168.1.78 and has a container named ContainerA that hosts a web application on port 84. ContainerA has an IP address of 172.16.5.6 and a port mapping from port 80 on ServerA to port 84 on ContainerA. You have a server named ServerB that has an IP address of 192.168.1.79. What IP address and port should you connect to if you need to connect to the web application from ServerB?
A. 172.16.5.6:80 
B. 172.16.5.6:84 
C. 192.168.1.78:80 
D. 192.168.1.78:84
A

A. You would want to connect to ContainerA since that is where the web application is located. ContainerA has an IP address of 172.16.5.6 and a port mapping from port 80.

32
Q

You are the administrator for your company network. You have a Windows Server 2016 Hyper-V host named ServerA that has a virtual machine named Server1. Server1 is con- figured to run the Docker daemon. On Server1 you have a container network that uses transparent mode. You need to ensure that containers that run on Server1 can obtain IP addresses from DHCP. What should you do?
A. On ServerA, run docker network connect.
B. On ServerA, run Get-VMNetworkAdapter-VMName
Server1| Set-VMNetworkAdapter-MacAddressSpoofing On.
C. On Server1, run docker network connect.
D. On Server1, run Get-VMNetworkAdapter-VMName
Server1| Set-VMNetworkAdapter-MacAddressSpoofing On.

A

B. You will want to configure Media Access Control (MAC) address spoofing on Ser- verA. If your container host is virtualized, you must enable MAC address spoofing. The Get-VMNetworkAdapter cmdlet gets the virtual network adapters of the specified virtual machine, snapshot, or management operating system. The -VMName parameter specifies the virtual machine whose virtual network adapters are to be retrieved. The Set-VMNetworkAdapter cmdlet configures features of the virtual network adapter in
a virtual machine or the management operating system. The -MacAddressSpoofing parameter specifies whether virtual machines may change the source MAC address in outgoing packets to one not assigned to them. Allowed values are On (allowing the vir- tual machine to use a different MAC address) and Off (allowing the virtual machine to use only the MAC address assigned to it).

33
Q
You are the administrator for your company network. You have a Windows Server 2016 server and you install the Docker daemon. What should you do if you need to configure the Docker daemon to accept connections from TCP port 64500 only?
A. Edit the configuration.json file.
B. Edit the daemon.json file.
C. Run the New-NetFirewallRule cmdlet. 
D. Run the Set-Service cmdlet.
A

B. Administrators can set any configuration option for the daemon in a JSON format. This would be the daemon.json file. By default, Docker captures the standard output (and standard error) of all your containers, and writes them in files using the JSON format. The default file location is C:\ProgramData\docker\config\daemon.json.

34
Q
You are the administrator for your company network. You have a Windows Server 2016 container host. What parameter should you use with the docker run command if you need to start a Hyper-V container?
A. --entrypoint 
B. --expose
C. --runtime
D. --isolation 
E. --privileged
A

D. When you are working with Hyper-V containers in Docker, the settings are identical to managing Windows Server containers. The one difference that you want to include in the Hyper-V Container is using the ––isolation=hyperv parameter. The following is an example of the docker command with the Hyper-V parameters: docker run
-it ––isolation=hyperv microsoft/nanoserver cmd.

35
Q

You are the administrator for your company network. You and a colleague are discussing the Azure Container Service and what it can be used for. Which statement is true regard- ing the Azure Container Service?
A. Uses commercial scheduling and management tools
B. Uses open source scheduling and management tools
C. Uses proprietary scheduling and management tools
D. Uses registered scheduling and management tools

A

B. The Azure Container Service allows you to easily create, configure, and manage your virtual machine cluster of containers. By using open source tools, the Azure Container Service connects you with thousands of other users who are also designing, building, and maintaining container images.

36
Q

You are the administrator for your company network. The network has a main office and several branch offices and consists of an Active Directory domain. The main office contains three domain controllers and each branch office has one domain controller. You discover that the new settings in the Default Domain Policy are not applied in one of the branch offices, but all other Group Policy Objects (GPOs) are applied. You need to check the rep- lication of the Default Domain Policy for the branch office. What should you do from a domain controller in the main office?
A. Click Default Domain Policy and then open the Details tab from Group Policy Management.
B. Click Default Domain Policy and then open the Scope tab from Group Policy Management.
C. From a command prompt, run repadmin.exe.
D. From a command prompt, run dcdiag.exe

A

C. repadmin.exe is the Replication Diagnostics Tool. This command-line tool assists administrators in diagnosing replication problems between Windows domain controllers. repadmin.exe can also be used for monitoring the relative health of an Active Directory forest.

37
Q
You are the administrator for your company network. You are discussing Container com- ponents with a coworker. This component can be on a physical or virtual machine, and it is the component that is configured with the Windows Container feature. What is being described?
A. Container Host
B. Container Image
C. Container OS Image
D. Container Registry
A

A. The Container Host component can be on a physical or virtual machine and it’s con- figured with the Windows Container feature. So the Windows Container sits on top of the Container Host.

38
Q
You are the network administrator. You have decided  that it would like to start using containers. You have installed Docker and now wish to add an image to a container. You check out images that are currently available in your reposi- tory. Now, what item is required to turn the image into a container?
A. Image ID
B. Image Info 
C. Image Name 
D. Image Status
A

A. You will need the Image ID. For example, the Image ID for my Nano Server is d9bccb- 9d4cac. You will use this ID to turn the image into a container. Type the following into a Pow- erShell prompt (your Image ID will be different) and press Enter: docker run d9bccb9d4cac.

39
Q

You are the administrator for your company network. You and a coworker are discussing using Docker Hub to set up a private repository. What statement is true regarding Docker Hub and a private repository?
A. Only Windows images are allowed in a Docker Hub repository.
B. Once images are added to the Docker Hub, everyone will have access to the images;
there is no private option.
C. Administrators can add users and accounts to the Docker Hub to verify that only the organization’s users are accessing the images.
D. There is a monthly fee to set up a private Docker Hub repository

A

C. Administrators have the ability to set up a private repository so that coworkers can share and use the images that you create. After you create your images using the Docker daemon, you can then push those images to your corporate Docker Hub repository. Admin- istrators can then add users and accounts to the Docker Hub to verify that only the organi- zation’s users are accessing the images.

40
Q
You are the network administrator for your company network. You have a two-node Hyper-V cluster named ClusterA. A virtual machine named VM-1 runs the cluster. You need to configure monitoring of VM-1. You have to move VM-1 to a different node if the Print Spooler service on VM-1 stops unexpectedly. What should you use?
A. clussvc.exe command
B. cluster.exe command
C. Computer Management console
D. configurehyperv.exe command
E. Disk Management console
F. Failover Cluster Manager console
G. Hyper-V Manager console
H. Server Manager Desktop app
A

F. Failover Cluster Manager is also called “VM Monitoring.” It allows you to monitor the health state of applications that are running within a virtual machine and then reports that to the host level so that it can take recovery actions. You can monitor any Windows service (such as the Print Spooler service) in your virtual machine. When the condition you are monitoring gets triggered, the Cluster Service logs an event and takes recovery actions.

41
Q

You are the administrator of your company network. You have an Active
Directory domain. The domain contains Windows Server 2016 servers named ServerA, ServerB, and ServerC. ServerA and ServerB are nodes in a Hyper-V cluster named Cluster-1. You add a Hyper-V Replica Broker role named Broker-1 to Cluster-1. ServerC is a Hyper-V server and also has a virtual machine named VM-1. Live Migration is enabled on all three servers and they are configured to use Kerberos authentication only. You need to ensure that you can perform the migration of VM-1 to ServerB. What should you do?
A. Add the ServerC computer account to the Replicator group on ServerA and ServerB.
B. Modify the Cluster permissions for Cluster-1.
C. Modify the Delegation settings on the ServerC computer account.
D. Modify the Storage Migration settings on ServerC.

A

C. If you use Kerberos to authenticate Live Migration traffic, make sure to configure con- strained delegation. To configure constrained delegation, open the Active Directory Users and Computers snap-in. Kerberos constrained delegation eliminates the need for requiring users to provide credentials twice. In this case, you would modify the Delegation settings on the ServerC computer account.

42
Q

You are the administrator for your company network. You have a computer that has the
following four hard disk drives installed:

Drive A—500 GB OS volume
Drive B—400 GB data volume
Drive C—400 GB empty volume
Drive D—500 GB empty volume

You want to create a two-way mirror using Storage Spaces. What drives should you use while at the same time minimizing data loss?
A. Drive A and Drive B
B. Drive A and Drive D
C. Drive B and Drive C
D. Drive C and Drive D
A

D. Since you are creating a two-way mirror, you will require at least two disks. This writes two copies of your data on the drives, which can protect your data from a single drive failure. Since we want to minimize data loss, you will use Drives C and D because there is nothing in them.

43
Q

You are the administrator for your company network. You purchase a new computer. You have six external USB hard drives and you want to create a single volume by using these USB drives. You want the volume to be expandable, portable, and resilient in the event of simultaneous failure of two USB hard drives. What should you do if you need to create the volume?
A. Create a new Storage Space across six USB hard drives; set the resiliency type to Three- Way Mirror from the Control Panel.
B. Create a new Storage Space across six USB hard drives; set the resiliency type to Parity from the Control Panel.
C. Create a new spanned volume from Disk Management.
D. Create a new striped volume from Disk Management.

A

A. Storage Spaces supports four types of resiliency: single, two-way mirror, three-way mir- ror, and parity. This question states that two USB drives have failed. So the answer would be a three-way mirror. This option works similar to the two-way mirror, but it writes three copies of your data on the drives, which will help protect your data from two simultaneous drive failures. Three-way mirror requires at least three drives.

44
Q
You are the administrator for your company network. You have a failover cluster named ClusterA that runs a highly available virtual machine named VM-1 that runs a custom application named App1. You need to configure monitoring of VM-1. If App1 adds an error entry to the Application event log, VM-1 should be automatically rebooted and moved to another cluster node. What tool should you use to accomplish this?
A. Failover Cluster Manager 
B. Hyper-V Manager
C. Resource Monitor
D. Server Manager
A

A. Failover Cluster Manager is a management tool within the Windows Server operating system that is used to create, validate, and manage failover server clusters running Win- dows Server. Administrators can open the Failover Cluster Manager by clicking Start ➢ Administrative Tools ➢Failover Cluster Manager.

45
Q

You are the administrator for your company network. A coworker previously opened Hyper-V Manager, selected a virtual machine, and used the Enable Replication Wizard. The process was completed successfully and replication occurred as expected. However, several weeks later, you decide you want to run a planned failover. How should you first proceed?
A. Right-click the primary virtual machine and select Replication ➢Planned Failover. B. Right-click the replica virtual machine and select Replication ➢Planned Failover.
C. Right-click the primary virtual machine and select Replication ➢Extend Replication. D. Right-click the replica virtual machine and select Replication ➢Test Failover.

A

A. Planned Failover is an operation initiated on the primary virtual machine. Planned Failover is used when you want to perform host maintenance on the primary virtual machine and would like to run from the replica site.

46
Q
You are the administrator for your company network. You have a Windows Server 2016 Hyper-V host named ServerA that hosts two virtual machines named VM-1 and VM-2. On the Hyper-V host, you create two virtual disks named DiskA and DiskB. You plan to create a test environment for Storage Spaces Direct. You need to configure the virtual machines to connect to the virtual disks. What should you use?
A. An iSCSI target
B. A virtual SCSI controller
C. A virtual Fibre Channel adapter
D. A virtual IDE controller
A

B. Each virtual machine needs a virtual disk that is used as a boot/system disk, and two or more virtual disks to be used for Storage Spaces Direct. Disks used for Storage Spaces Direct must be connected to the virtual machines using a virtual SCSI controller.

47
Q

You You are the administrator of your company network. You have two servers that run Windows Server 2016. You install the Failover Clustering feature on both servers. You plan to create a workgroup cluster. What should you do?
A. Create matching local administrative accounts on both of the servers. Assign the same primary DNS suffix to both of the servers. Run the New-Cluster cmdlet and specify an administrative access point of None.
B. Configure both of the servers to be in a workgroup named Workgroup. Configure the Cluster Service to log on as Network Service. Run the New-Cluster cmdlet and specify an administrative access point of DNS.
C. Create matching local administrative accounts on both of the servers. Assign the same primary DNS suffix to both of the servers. Run the New-Cluster cmdlet and specify an administrative access point of DNS.
D. Configure both of the servers to be in a workgroup named Workgroup. Configure the Cluster Service to log on as Network Service. Run the New-Cluster cmdlet and specify an administrative access point of None.

A

B. To set up a cluster in a workgroup, you need to configure both of the servers to be in a workgroup. You then need to configure the Cluster Service to log on as Network Service and specify an administrative access point of DNS. The New-Cluster cmdlet creates a new failover cluster. Before you create a cluster, the hardware (servers, networks, and storage) must be con- nected, and the validation tests must be run. The -AdministrativeAccessPoint parameter specifies the type of administrative access point that the cmdlet creates for the cluster. DNS creates an administrative access point for the cluster. The administrative access point is regis-
tered in DNS but is not enabled in Active Directory Domain Services (AD DS).

48
Q

You are the administrator of your company network. You have an Active
Directory domain that contains two Windows Server 2016 servers named ServerA and ServerB. Each server has an operating system disk and four data disks. All of the disks are locally attached SATA disks. Each disk is a basic disk, is initialized as a MBR disk, and has a single NTFS volume. You plan to implement Storage Spaces Direct by using the data disks on ServerA and ServerB. You need to prepare the data disks for the Storage Spaces Direct implementation. What should you do?
A. Convert the data disks to dynamic disks.
B. Delete the volumes from the data disks.
C. Format the volumes on the data disks as exFAT.
D. Initialize the data disks as GPT disks and create an ReFS volume on each disk.

A

D. Microsoft recommends using the Resilient File System (ReFS) for Storage Spaces Direct. ReFS is the premier filesystem built for virtualization and offers many advantages, includ- ing dramatic performance accelerations and built-in protection against data corruption.

49
Q

You are the administrator for your company network. You have two Windows Server 2016 Hyper-V hosts named ServerA and ServerB that are nodes in a failover cluster. You have a virtual machine named VM-1 that connects to a virtual switch named vSwitch1. You dis- cover that VM-1 automatically live migrates when vSwitch1 temporarily disconnects. You need to prevent VM-1 from being live migrated when vSwitch1 temporarily disconnects. What should you do?
A. Run the Set-VMNetworkAdapter cmdlet and set StormLimit to 0.
B. From the network adapter setting of VM-1, disable the Heartbeat integration service.
C. Run the Set-VMNetworkAdapter cmdlet and set IsManagementOS to False.
D. From the network adapter setting of VM-1, disable the Protected network setting.

A

D. To prevent the virtual machine from being live migrated automatically, you need to go into the network adapter settings of the virtual machine and disable the protected network setting.

50
Q

You are the administrator for your company network. You have a Hyper-V failover cluster that contains three nodes. The virtual machines are distributed evenly across the nodes. Which settings should you modify if you need to ensure that if a node loses connectivity from the other nodes that the virtual machines on the node will be transitioned to one of the remaining nodes after one minute?
A. QuarantineDuration and QuarantineThreshold
B. QuorumArbitrationTimeMax and RequestReplyTimeout
C. ResiliencyPeriod and ResiliencyLevel
D. SameSubnetDelay and CrossSubnetDelay

A

B. The quorum arbitration time setting is used to set the limit of the time period that is allowed for quorum arbitration. Quorum arbitration is the process that occurs when the con- trolling node of the cluster is no longer active and other nodes of the cluster attempt to gain control of the quorum resource and thus control of the cluster. QuorumArbitrationTimeMax specifies the maximum number of seconds a node is allowed to spend arbitrating for the quo- rum resource in a cluster. RequestReplyTimeout describes the length of time a request from a node with a cluster state update will wait for replies from the other healthy nodes before the request times out.