Q1. - (Topic 7)
This question consists of two statements: One is named Assertion and the other is named Reason. Both of these statements may be true; both may be false; or one may be true, while the other may be false.
To answer this question, you must first evaluate whether each statement is true on its own. If both statements are true, then you must evaluate whether the Reason (the second statement) correctly explains the Assertion (the first statement). You will then select the answer from the list of answer choices that matches your evaluation of the two statements.
Assertion:
You can manage VMware ESX hosts and virtual machines by using a System Center Virtual Machine Manager (SCVMM) server.
Reason:
SCVMM automatically imports ESX hosts and virtual machines when you add the corresponding VMware vCenter to the SCVMM server.
Evaluate the Assertion and Reason statements and choose the correct answer option.
A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the Assertion.
B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the Assertion.
C. The Assertion is true, but the Reason is false.
D. The Assertion is false, but the Reason is true.
E. Both the Assertion and the Reason are false.
Answer: C
Explanation: * Assertion: true Virtual Machine Manager (VMM) enables you to deploy and manage virtual machines and services across multiple hypervisor platforms, including VMware ESX and ESXi hosts.
* Reason: False When you add a vCenter Server, VMM no longer imports, merges and synchronizes the VMware tree structure with VMM. Instead, after you add a vCenter Server, you can add selected ESX servers and hosts to any VMM host group. Therefore, there are fewer issues with synchronization.
Reference: Managing VMware ESX Hosts in VMM Overview
https://technet.microsoft.com/en-us/library/gg610683.aspx
Q2. - (Topic 8)
NOTE: Once you answer this question, you will NOT be able to return to it. You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
Solution: You configure preferred and possible owners for each business-critical VM.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q3. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:
. Microsoft Exchange Server 2013
. Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
. A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013. . A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. From Operations Manager, enable audit collection.
B. From Operations Manager, implement two monitors.
C. From Computer Management, implement one event subscription.
D. From Operations Manager, implement two rules.
Answer: D
Q4. DRAG DROP - (Topic 3)
You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q5. - (Topic 8)
Your company has a human resources department and a finance department.
You are planning an administrative model for both departments to meet the following requirements:
. Provide human resources managers with the ability to view the audit logs for the files of their department. . Ensure that only domain administrators can view the audit logs for the files of the finance department.
You need to recommend a solution for the deployment of file servers for both departments.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Deploy one file server. Add the human resources managers to the local Administrators group.
B. Deploy one file server. Add the human resources managers to the local Event Log Readers group.
C. Deploy two file servers. Add the human resources managers to the local Administrators group on one of the servers.
D. Deploy two file servers. Add the human resources managers to the local Event Log Readers group on one of the servers.
Answer: D
Q6. - (Topic 8)
Your company has a human resources department a finance department, a sales department and an R&D department.
The company audits the access of documents that contain department-specific sensitive information.
You are planning an administrative model for the departments to meet the following requirements:
. Provide R&D managers with the ability to back up all the files of their department only. . Provide finance managers with the ability to view the audit logs for the files of their department only. . Provide human resources managers with the ability to view the audit logs for the files of their department only. . Provide sales managers with the ability to modify the permissions on all the shared folders of their department only.
You need to identify the minimum amount of file servers required on the network to meet the requirements of each department.
How many file servers should you identify?
A. 1
B. 2
C. 3
D. 4
Answer: C
Q7. - (Topic 8)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q8. - (Topic 2)
You are evaluating the use of VMM to migrate APP1 for the sales users. You need to identify the effects of the migration.
What should you identify?
A. The VHDs and the virtual machine configuration files will move. The sales users' access to APP1 will be interrupted.
B. The VHDs will move but the virtual machine configuration files will remain in the original location. The sales users will continue to have uninterrupted access to APP1.
C. The virtual machine configuration files will move but the VHDs will remain in the original location. The sales users' access to APP1 will be interrupted.
D. The VHDs and the virtual machine configuration files will move. The sales users will continue to have uninterrupted access to APP1.
Answer: D
Q9. - (Topic 7)
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You enable the decommissioning service by using the AD RMS management console. You grant all users the Read & Execute permission to the decommission pipeline.
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation: The proper procedure is:
. Inform your users that you are decommissioning the AD.RMS installation and advise them to connect to the cluster to save their content without AD.RMS protection. Alternatively, you could delegate a trusted person to decrypt all rights-protected content by temporarily adding that person to the AD.RMS super users group.
. After you believe that all of the content is unprotected and saved, you should export the server licensor certificate, and then uninstall AD.RMS from the server.
Q10. - (Topic 8)
Your company has three main offices named Main1, Main2, and Main3.
The network contains an Active Directory domain named contoso.com.
Each office contains a help desk group.
You plan to deploy Microsoft System Center 2012 Configuration Manager to meet the
following requirements:
. The members of the Domain Admins group must be able to manage all of the Configuration Manager settings.
. The help desk groups must be able to manage only the client computers in their respective office by using Configuration Manager.
You need to recommend a Configuration Manager infrastructure to meet the requirements.
Which infrastructure should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. Three sites that contain one collection for each office
B. One site that contains one collection
C. Three sites that each contain one collection
D. One site that contains a collection for each office
Answer: D