Download Installation, Storage, and Compute with Windows Server 2016.70-740.PracticeTest.2018-10-09.118q.vcex

Vendor: Microsoft
Exam Code: 70-740
Exam Name: Installation, Storage, and Compute with Windows Server 2016
Date: Oct 09, 2018
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You are a server administrator at a company named Contoso, Ltd. 
Contoso has a Windows Server 2016 Hyper-V environment configured as shown in the following table. 
  
All of the virtual switches are of the external type. 
You need to ensure that you can move virtual machines between the hosts without causing the virtual machines to disconnect from the network. 
Solution: You implement live migration by using Host1 and Host2.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You are a server administrator at a company named Contoso, Ltd. 
Contoso has a Windows Server 2016 Hyper-V environment configured as shown in the following table. 
  
All of the virtual switches are of the external type. 
You need to ensure that you can move virtual machines between the hosts without causing the virtual machines to disconnect from the network. 
Solution: You implement a Hyper-V Replica between Host2 and Host4.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 3
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory forest. 
You install Windows Server 2016 on 10 virtual machines. 
You need to deploy the Web Server (IIS) server role identically to the virtual machines. 
Solution: You use Windows PowerShell Desired State Configuration (DSC) to create a default configuration, and then you apply the configuration to the virtual machines.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Explanation:
DSC gives us a declarative model for system configuration management. What that really means is that we can specify how we want a workstation or server (a ‘node’) to be configured and we leave it to PowerShell and the Windows Workflow engine to make it happen on those target ‘nodes’. We don’t have to specify how we want it to happen. The main advantages of DSC are:To simplify your sysadmin tasks by configuring one or more devices automatically To be able to configure machines identically with the aim to standardize them To ensure, at a given time, that the configuration of a machine always be identical to its initial configuration, so as to avoid drift Deployment on demand as a Cloud strategy, or ‘en masse’, is largely automated and simplified References:https://www.simple-talk.com/sysadmin/powershell/powershell-desired-state-configuration-the-basics/
DSC gives us a declarative model for system configuration management. What that really means is that we can specify how we want a workstation or server (a ‘node’) to be configured and we leave it to PowerShell and the Windows Workflow engine to make it happen on those target ‘nodes’. We don’t have to specify how we want it to happen. 
The main advantages of DSC are:
  • To simplify your sysadmin tasks by configuring one or more devices automatically 
  • To be able to configure machines identically with the aim to standardize them 
  • To ensure, at a given time, that the configuration of a machine always be identical to its initial configuration, so as to avoid drift 
  • Deployment on demand as a Cloud strategy, or ‘en masse’, is largely automated and simplified 
References:
https://www.simple-talk.com/sysadmin/powershell/powershell-desired-state-configuration-the-basics/
Question 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory forest. 
You install Windows Server 2016 on 10 virtual machines. 
You need to deploy the Web Server (IIS) server role identically to the virtual machines. 
Solution: From a Group Policy object (GPO), you create an application control policy, and then you apply the policy to the virtual machines.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory forest. 
You install Windows Server 2016 on 10 virtual machines. 
You need to deploy the Web Server (IIS) server role identically to the virtual machines. 
Solution: You create a software installation package, and then you publish the package to the virtual machines by using a Group Policy object (GPO).
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 6
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a server named Server1 that runs Windows Server 2016. 
Server1 hosts a line-of-business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. 
You need to log an event in the Application event log whenever App1 consumes more than 4 GB of memory. 
Solution: You create a performance counter data collector.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 7
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a server named Server1 that runs Windows Server 2016. 
Server1 hosts a line-of-business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. 
You need to log an event in the Application event log whenever App1 consumes more than 4 GB of memory. 
Solution: You create a performance counter alert data collector.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Question 8
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a server named Server1 that runs Windows Server 2016. 
Server1 hosts a line-of-business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. 
You need to log an event in the Application event log whenever App1 consumes more than 4 GB of memory. 
Solution: You create a system configuration information data collector.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 9
You have an Active Directory domain named Contoso.com. The domain contains servers named Server1, Server2 and Server3 that run Windows Server 2016. 
Server1 and Server 2 are nodes in a Hyper-V cluster named Cluster1. You add a Hyper-V Replica Broker role named Broker1 to Cluster1. 
Server3 is Hyper-V server. A virtual machine VM1 runs on Server3. 
Live Migration is enabled on all three servers and it is configured to use Kerberos authentication only. 
You need to ensure that you can perform the migration of VM1 to Server2. 
What should you do?
  1. Modify the Storage Migration settings on Server3.
  2. Modify the Cluster permissions for Cluster1.
  3. Add the Server3 computer account to the Replicator group on Server1 and Server2.
  4. Modify the Delegation settings of the Server3 computer account.
Correct answer: D
Explanation:
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation. This involves modifying the Delegation settings of the source server, which is Server3 in this instance. References:https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspx#BKMK_Step1
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation. This involves modifying the Delegation settings of the source server, which is Server3 in this instance. 
References:
https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspx#BKMK_Step1
Question 10
You have a Windows Server 2016 Hyper-V failover cluster that contains two nodes named Node1 and Node2. 
On Node1, you create a virtual machine named VM01 by using Hyper-V Manager. 
You need to configure VM01 to move to Node2 automatically if Node1 becomes unavailable. 
What should you do?
  1. From Failover Cluster Manager, run Configure Role actions.
  2. From Hyper-V Manager, click VM01, and click Enable Replication.
  3. From Hyper-V Manager, click Node1, and then modify the Hyper-V settings.
  4. From Windows PowerShell, run the Enable-VMReplicationcmdlet.
Correct answer: A
Explanation:
If you have VMs on cluster nodes that are not currently cluster resources, it's a simple process to make them highly available, provided they're using cluster storage (such as a Cluster Shared Volume):1. Start Failover Cluster Manager. 2. Expand the cluster Roles. 3. Select the Configure Role... action. 4. Click Next to the introduction wizard. 5. In the Select Role dialog box, select Virtual Machine as the type and click Next. 6. Select all the virtual machines you want to make highly available and click Next. 7. Click Next to the confirmation. 8. Click Finish to the report, which should show Success for all. If there are Warnings, check and resolve problems if needed References:http://windowsitpro.com/hyper-v/make-vm-highly-available-windows-server-2012
If you have VMs on cluster nodes that are not currently cluster resources, it's a simple process to make them highly available, provided they're using cluster storage (such as a Cluster Shared Volume):
1. Start Failover Cluster Manager. 
2. Expand the cluster Roles. 
3. Select the Configure Role... action. 
4. Click Next to the introduction wizard. 
5. In the Select Role dialog box, select Virtual Machine as the type and click Next. 
6. Select all the virtual machines you want to make highly available and click Next. 
7. Click Next to the confirmation. 
8. Click Finish to the report, which should show Success for all. If there are Warnings, check and resolve problems if needed 
References:
http://windowsitpro.com/hyper-v/make-vm-highly-available-windows-server-2012
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!