Note This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Start of Repeated Scenario:
A company named Contoso, ltd. has several servers that run Windows Server 2016 Contoso has a Hyper V environment that uses failover clustering and Windows Server Update Services (WSUS). The environment contains several Windows containers and several virtual machines.
The WSUS deployment contains one upstream server that is located on the company’s perimeter network and several downstream servers located on the internal network, A firewall separates the upstream server from the downstream servers.
You plan to deploy a human resources application to a new server named HRServer5. HRServer5 contains a FAT32-formatted data volume.
The CIO of Contoso identifies the following requirements for the company’s IT department:
• Deploy failover cluster to two new virtual machines.
• Store all application databases by using Encrypted File System (EFS).
• Ensure that each Windows container has a dedicated IP address assigned by a DHCP server
• Produce a report that lists the processor time used by all of the processes on a server named Server 1 for five hour.
Encrypt all communication between the internal network and the perimeter network, including all WSUS communications.
• Automatically load balance the virtual machines hosted in the Hyper-V cluster when processor utilization exceeds 70 percent.
End of Repeated Scenario.
You need to modify the Hyper V cluster to meet the load balancing requirement for the virtual machine. Which command should you run?
A. (Get-ClusterParameter) AutoBalanecrMode=2
You have a server named Server1 that runs Windows Server 2016. Windows Defender is enable…….
Server1 runs an application named App1 that stores various types of files in Microsoft One…….. and Microsoft SharePoint Online. App1 also interacts with several local services.
You need to prevent Windows Defender from scanning any files opened by App1.
What should you do on Server1?
A. Modify the real-time protection settings in Windows Defender.
B. Modify the cloud-based protection settings in Windows Defender.
C. Run the New-AppLockerPolicy cmdlet.
D. From the Windows Defender settings, configure a process exclusion.
You have just finished installing Windows Server 2016 on a new server.
Your colleague has informed you that its essential that you must activate Windows Server.
Which of the following command line tools can be used to Activate Windows Server?
A. Netdom C:\windows\system32\slmgr.vbs -ato
B. Netsh C:\windows\system32\slmgr.vbs -ato
C. Ocsetup C:\windows\system32\slmgr.vbs -ato
D. Cscript C:\windows\system32\slmgr.vbs Cato
The correct answer is Cscript C:\windows\system32\slmgr.vbs -ato
You have an Active Directory domain named Contoso com The domain contains Hyper-V hosts named Server1 and Server2 that run Windows Server 2016 The Hyper-V hosts are configured to use NVGRE for network virtualization
You have four virtual machines that are connected to an external switch The virtual machines are configured as shown
To which virtual machine or virtual machines can VM1 and VM3 connect"? To answer, select the appropriate options in the answer area
Your network contains an Active Directory forest The forest contains two sites named Site1 and Site2. Site1 contains 10 domain controllers Site1 and Site2 connect to each other by using a WAN link
You run the Active Directory Domain Services Configuration Wizard as shown in the following graphic.
Server3 is the only server in Site2
Use the drop-down menus to select the answer choice that completes each statement based on the information graphic.
You are deploying DirectAccess to a server named DA1. Da1 will be located behind a firewall and will have a single network adapter The intermediary network will be IPv4.
You need to configure firewall to support DirectAccess.
Which firewall rules should you create for each type of traffic? To answer, drag the appropriate ports and protocols to the correct traffic types. Each port and protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content
You have a Hyper-V host named Server1 that runs Windows Server 2016. Server1 hosts a virtual machine.
You need to provide VM1 with direct access to a graphics processing unit (GPU) on Server1.
What should you do first?
A. Disable the display adapter device on Server1.
B. In the settings of VM1, add a RemoteFX 3D Video Adapter.
C. On VM1, install the Quality Windows Audio Video Experience (qWave) feature.
D. Dismount the display adapter on Server1.
Your network contains an Active Directory forest. The forest contains one domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. DC1 holds all of the operations master roles.
During normal network operations, you run the following commands on DC2:
You remove DC1 from the network, and then you run the following command:
For each of the following statements, select Yes if the statement if true. Otherwise, select No.
Note: This question is part of a series of questions that use the same scenario. For your convenience ………. repeated in each question. Each question presents a different goal and answer choices, but the test ……….. exactly the same in each question in this series.
Start of repeated scenario
Your network contains an Active Directory domain named contoso.com. The functional level of the forest …………. Windows Server 2008 R2. All servers in the domain run Windows Server 2016 Standard. The domain ……. that run either Windows 8.1 or Windows 10.
The domain contain nine servers that are configured as shown in the following table.
A. Dynamic Memory
B. Numa spanning
C. live migration
D. Smart Paging
You have two servers named Server1 and Server2 that run Windows Server 2016.
You plan to implement Storage Replica to replicate the contents of volumes on Server1 to Server2.
You need to ensure that the replication traffic between the servers is limited to a maximum of 100 Mbps.
Which cmdlet should you run?