Server Virtualization with Windows Server Hyper-V and System Center
Question No: 11
A company has one central data center and five branch offices. Each office has three Hyper-V host servers that run Windows Server 2012 R2 Datacenter edition. Each branch office has a system administrator. You plan to deploy virtual machines (VMs) that run Windows Server 2012 R2 Standard edition to each branch office.
You have the following requirements:
->The VMs must be activated at the branch offices, even if the branch office has no Internet connectivity.
->Activation keys must NOT be shared with the branch office administrators.
->You must be able to track license usage from the central location, even without access rights to the VMs.
->You must be able to verify license compliance and perform real time reporting on license usage from a central location.
You need to configure licensing and activation for the VMs. Which feature or tool should you use?
Multiple Activation Key (MAK)
Volume Activation Management Tool (VAMT)
Key Management Service (KMS)
Automatic Virtual Machine Activation (AVMA)
Automatic Virtual Machine Activation (AVMA) acts as a proof-of-purchase mechanism, helping to ensure that Windows products are used in accordance with the Product Use Rights and Microsoft Software License Terms.
AVMA lets you install virtual machines on a properly activated Windows server without having to manage product keys for each individual virtual machine, even in disconnected environments.
AVMA binds the virtual machine activation to the licensed virtualization server and activates the virtual machine when it starts up.
AVMA also provides real-time reporting on usage and historical data on the license state of the virtual machine.
Reporting and tracking data is available on the virtualization server.
Question No: 12
You manage a virtualization environment that contains Windows Server 2012 R2 servers that have the Hyper-V role installed. You manage the host servers by using Virtual Machine Manager (VMM) in System Center 2012 R2.
You must monitor the virtualization environment, including all virtual machines and service instances.
You need to configure monitoring.
Which three actions should you perform? Each correct answer presents part of the solution.
Import the VMM Management Pack and then deploy agents to the Hyper-V host servers and the VMM server. On the Hyper-V host server, enable agent proxy for the Operations Manager agent.
In the VMM console, add the name of an Operations Manager server to the management group that will be used to monitor the virtualization infrastructure.
On the VMM server, install the Operations Manager console.
On the Operations Manager management server, enable Windows Remote Management (WinRM).
Import the VMM Management Pack and then deploy agents to Hyper-V host servers and the VMM Server. On the VMM server, enable agent proxy for the Operations Manager agent.
Configure the VMM server and the Active Directory computer accounts of the Hyper-V host servers to allow constrained delegation.
Answer: A,B,C Explanation:
Step 1: (C)
The Operations Manager is a requirement.
With System Center Operations Manager 2012 SP1, customers can now monitor Hyper-V Replica using a Management Pack available for free from the SCOM catalogue.
Step 2: (A)
An Operations Manager agent is a service that is installed on a computer.
The agent collects data, compares sampled data to predefined values, creates alerts, and runs responses.
A management server receives and distributes configurations to agents on monitored computers.
Step 3: (B)
Enter in one of your management server names to provide the SDK connection to VMM. Next – we will need two accounts. One for SCVMM to connect to SCOM, and one for SCOM to connect to SCVMM.
Question No: 13
A company has an environment that runs System Center 2012 R2 Operations Manager and System Center 2012 R2 Virtual Machine Manager (VMM). The company also has web applications that are used by employees.
You must plan a management strategy for the company.
You need to ensure that you can monitor the web applications from outside the company network.
Which tool should you use as part of the monitoring strategy?
System Center Global Service Monitor
Microsoft Monitoring Agent
System Center Fabric Health Dashboard
Answer: A Explanation:
Ref: http://www.microsoft.com/en-us/server-cloud/system-center/global-service- monitor.aspx
Question No: 14
A company has Active Directory Domain Services (AD DS) domain controllers that run on Windows Server 2012 R2 servers. There are two forests, and each has a single domain. There is a two-way forest trust between the forests. The company uses Hyper-V for server virtualization. The Hyper-V environment contains the Hyper-V host servers as shown in the following table:
You prepare to deploy System Center 2012 R2 Data Protection Manager (DPM) to back up the Hyper-V environment. The deployment must meet the following requirements:
->ensure that all Hyper-V servers can be backed up from a minimum of two DPM servers
->minimize the total number of DPM servers
You need to deploy DPM to the environment. What should you deploy?
four DPM servers in the internal network and two DPM servers in the perimeter network
two DPM servers in the internal network and one DPM server in the perimeter network
two DPM servers in the internal network only
two DPM servers in the internal network and two DPM servers in the perimeter network
Answer: C Explanation:
DPM can protect servers and workstations across domains within a forest that has a two- way trust relationship with the domain that the DPM server is located in. If there is not a two-way trust across domains, you can protect the computers using DPM’s support for computers in workgroups or untrusted domains. For more information, see Managing Protected Computers in Workgroups and Untrusted Domains.DPM supports data protection across forests as long as you establish a forest-level, two-way trust between the separate forests.
Question No: 15
A company has offices in Hamburg, New York, and San Francisco. The Hamburg office has one Hyper-V host server named HAM-HOST1. The New York office has two Hyper-V host servers named NYC-HOST1 and NYC-HOST2. The San Francisco office has one Hyper-V host server named SFC-HOST1. All Hyper-V host servers run Windows Server 2012 R2.
You must deploy an application virtual machine (VM) that will be used by the sales team at the company.
You need to ensure that the VM remains available during unplanned system outages. Which solution should you implement?
a Hyper-V cluster that includes NYC-HOST1 and NYC-HOST2
Server Message Block (SMB) 3.0 file shares on NYC-HOST1, NYC-HOST2, SFC- HOST1, and HAM-HOST1
a Distributed File System (DFS) replication between NYC-HOST1, SFC-HOST1, and HAM-HOST1
dynamic optimization on NYC-HOST1 and NYC-HOST2
Question No: 16 DRAG DROP
You administer a Windows Server 2012 R2 server that has the Hyper-V role installed. You have the following virtual machines (VMs):
You also have the following two switches:
VM-Server1 has network connectivity to VM-Server2 and VM-Server3, as well as the host server, VM-Server4 has network connectivity to VM-Server5, but NOT to the host server.
You need to configure VM-Server6 to ensure that VM-Server6 has network connectivity only to the other test VMs.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order,
Explanation: Box 1:
There are three types of virtual switches available – External, Internal and Private.
Private only allows communications between the virtual machines. It does not allow any communication of the VMs with the host operating system.
External allows you to connect your VMs to each other and to the physical host machine. It requires a physical adapter on the host machine that will be used to communicate with the physical network that the host is connected to.
Internal allows communications between the VMs and the host operating system. It does not require a physical adapter on the host machine and will not allow communication with any actual physical network.
Question No: 17
A company consolidates multiple data centers into a single centralized datacenter by using a Windows Server 2012 R2 server that has the Hyper-V role installed.
You must be able to support chargeback based on the usage of the following resources:
->average CPU usage per virtual machine (VM)
->average physical memory used by a VM over a period of time
->highest amount of memory assigned to a VM over a period of time
->highest amount of disk spaced assigned to a VM over a period of time
You need to track the resources without installing any additional tools. Which tool should you use?
Resource Metering C Reliability Monitor
Question No: 18
You have three Windows Server 2012 R2 servers that are set up as a Hyper-V cluster. You use System Center 2012 R2 Virtual Machine Manager to manage the Hyper-V environment.
Users report that when a Hyper-V host server becomes overloaded, the performance of the virtual machines is unacceptable.
You need to analyze workloads and automatically migrate virtual machines from overloaded host servers to host clusters that have available capacity.
What should you configure?
Performance and Resource Optimization (PRO)
shared .vhdx file
Explanation: Ref: http://technet.microsoft.com/en-us/library/gg675109.aspx Dynamic Optimization in VMM
During Dynamic Optimization, VMM migrates virtual machines within a host cluster to improve load balancing among hosts and to correct any placement constraint violations for virtual machines.
Dynamic Optimization can be configured on a host group, to migrate virtual machines within host clusters with a specified frequency and aggressiveness. Aggressiveness determines the amount of load imbalance that is required to initiate a migration during Dynamic Optimization. By default, virtual machines are migrated every 10 minutes with medium aggressiveness. When configuring frequency and aggressiveness for Dynamic Optimization, an administrator should factor in the resource cost of additional migrations against the advantages of balancing load among hosts in a host cluster. By default, a host group inherits Dynamic Optimization settings from its parent host group.
Dynamic Optimization can be set up for clusters with two or more nodes. If a host group contains stand-alone hosts or host clusters that do not support live migration, Dynamic Optimization is not performed on those hosts. Any hosts that are in maintenance mode also are excluded from Dynamic Optimization. In addition, VMM only migrates highly available virtual machines that use shared storage. If a host cluster contains virtual machines that are not highly available, those virtual machines are not migrated during Dynamic Optimization.
On demand Dynamic Optimization also is available for individual host clusters by using the
Optimize Hosts action in the VMs and Services workspace. On demand Dynamic Optimization can be performed without configuring Dynamic Optimization on host groups. After Dynamic Optimization is requested for a host cluster, VMM lists the virtual machines that will be migrated for the administrator#39;s approval.
Question No: 19
You have a Windows Server 2012 R2 Hyper-V environment that includes System Center 2012 R2 Virtual Machine Manager (VMM). The environment includes five physical servers. The servers are configured as follows:
You plan to use VMM to migrate physical machines to virtual machines. You must migrate all servers that support physical to virtual (P2V) migration. You need to migrate the servers.
Which three servers should you migrate? Each correct answer presents part of the solution.
Explanation: The source computer cannot have any volumes larger than 2040 GB. This disqualifies NYC-FS( not D) and NYC-EX (not E).
Requirements on the Source Machine
To perform a P2V conversion, your source computer:
/Must have at least 512 MB of RAM.
/ Cannot have any volumes larger than 2040 GB.
/ Must have an Advanced Configuration and Power Interface (ACPI) BIOS – Vista WinPE will not install on a non-ACPI BIOS.
/ Must be accessible by VMM and by the host computer.
/ Cannot be in a perimeter network. A perimeter network, which is also known as a screened subnet, is a collection of devices and subnets placed between an intranet and the Internet to help protect the intranet from unauthorized Internet users. The source computer for a P2V conversion can be in any other network topology in which the VMM server can connect to the source machine to temporarily install an agent and can make Windows Management Instrumentation (WMI) calls to the source computer.
Question No: 20 DRAG DROP
A company uses System Center 2012 R2 Virtual Machine Manager (VMM). The VMM server has the following shares:
You need to configure VMM to share physical resources with private cloud users.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
In \\Share1, create a shared folder named Data.
In \\Share1\Data, create a folder named ApplicationFrameworks
Copy the contents of the ApplicationFrameworks folder from the default library to
\\Share1\Data\ApplicationFrameworks. Add the \\Share1\Data\ApplicationFrameworks shared folder to the VMM library
EnsurePass ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No