realexamdumps.com

Thursday, 8 August 2019

Get Microsoft 70-743 Exam Free Study material | Realexamdumps.com

Question: 1

Your network contains three Hyper-V hosts. You add all of the hosts to a cluster.You need to create highly available storage spaces that connect to directly attached storage on the hosts.Which cmdlet should you use?

A. Update-ClusterVirtualMachineConfiguration
B. Enable-ClusterStorageSpacesDirect
C. Set-StoragePool
D. Add-ClusterDisk

Answer: B

Explanation:
The Enable-ClusterStorageSpacesDirect cmdlet enables highly available Storage Spaces that use directly
attached storage Storage Spaces Direct (S2D) on a cluster.

Question: 2

You have an Active Directory domain named Contoso.com. The domain contains servers named Server1,Server2 and Server3 that run Windows Server 2016.Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. You add a Hyper-V Replica Broker role named Broker1 to Cluster1.
Server3 is a Hyper-V server. A virtual machine named VM1 runs on Server3.Live Migration is enabled on all three servers and it is configured to use Kerberos authentication only.You need to ensure that you can perform the migration of VM1 to Server2.What should you do?

A. Add the Server3 computer account to the Replicator group on Server1 and Server2.
B. Modify the Delegation settings on the Server3 computer account.
C. Modify the Storage Migration settings on Server3.
D. Modify the Cluster permissions for Cluster1.

Answer: B

Explanation:
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained
delegation before you proceed to the rest of the steps.
To configure constrained delegation
Etc.

References:
https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspx

Question 3

Your network contains an Active Directory domain. The domain contains two Hyper-V hosts.You plan to perform live migrations between the hosts.You need to ensure that the live migration traffic is authenticated by using Kerberos.What should you do first?

A. From Server Manager, install the Host Guardian Service server role on a domain controller.
B. From Active Directory Users and Computers, add the computer accounts for both servers to the Cryptographic Operators group.
C. From Active Directory Users and Computers, modify the Delegation properties of the computer accounts for both servers.
D. From Server Manager, install the Host Guardian Service server role on both servers.

Answer: C

Explanation:
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained
delegation before you proceed to the rest of the steps.
To configure constrained delegation

Question: 4

You have a failover cluster named Cluster1.A virtual machine named VM1 is a highly available virtual machine that runs on Cluster1. A custom application named App1 runs on VM1.You need to configure monitoring on VM1. If App1 adds an error entry to the Application event log, VM1 should be automatically rebooted and moved to another cluster node.Which tool should you use?

A. Resource Monitor
B. Failover Cluster Manager
C. Server Manager
D. Hyper-V Manager

Answer: B

Explanation:
Do you have a large number of virtualized workloads in your cluster? Have you been looking for a
solution that allows you to detect if any of the virtualized workloads in your cluster are behaving
abnormally? Would you like the cluster service to take recovery actions when these workloads are in an
unhealthy state? In Windows Server 2012/2016, there is a great new feature, in Failover Clustering
called “VM Monitoring”, which does exactly that – it allows you monitor the health state of applications
that are running within a virtual machine and then reports that to the host level so that it can take
recovery actions.
VM Monitoring can be easily configured using the Failover Cluster Manager through the following steps:

References:
https://blogs.msdn.microsoft.com/clustering/2012/04/18/how-to-configure-vm-monitoring-inwindows-server-2012/

Question:5

You have a Hyper-V host named Server1 that runs Windows Server 2016.Server1 has a virtual machine named VM1. VM1 is configured to run the Docker daemon.
On VM1, you have a container network that uses transparent mode.You need to ensure that containers that run on VM1 can obtain IP addresses from DHCP.
What should you do?

A. On VM1, run docker network connect.
B. On Server1, run docker network connect.
C. On VM1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter – MacAddressSpoofing On.
D. On Server1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter – MacAddressSpoofing On.

Answer: D

Explanation:
If the container host is virtualized, and you wish to use DHCP for IP assignment, you must enable
MACAddressSpoofing.
PS C:\> Get-VMNetworkAdapter -VMName ContainerHostVM | Set-VMNetworkAdapter -
MacAddressSpoofing On
The command needs to be run on the Hyper-V host.

References:
https://msdn.microsoft.com/enus/virtualization/windowscontainers/management/container_networking

Get Microsoft 70-743 Exam Free Study material | Realexamdumps.com

2 comments:

  1. Download the IBM C1000-063 Q&A PDF file easily to prepare IBM Tivoli Network Manager V4.2 Implementation Exam. It is particularly designed for IBM C1000-063 exam and our IBM specialists have created this C1000-063 Question Dumps observing the original C1000-063 exam.

    ReplyDelete
  2. Prepare for IBM C1000-077 exam with our preparation material with full confidence. We offer you 100% real IBM Spectrum Protect Plus V10.1.5 Implementation Exam IBM C1000-077 exam dumps for your better results. Prepare4Test’s C1000-077 pdf dumps are verified by IBM Gurus.

    ReplyDelete