Mid Term 70-412 – Flashcards

Unlock all answers in this set

Unlock answers
question
Which PowerShell cmdlet is used to add a new dedicated IP to an NLB cluster node?
answer
Add NibClusterNodeDip
question
Which PowerShell cmdlet is to delete anNLB cluster?
answer
Remove-NibCluster
question
When you configure port rule for NLB cluster, you will need to configure all of the options listed here, expected for one. Which option in this list will you not configure for a part rule?
answer
The node IP address the rule should apply to
question
Which of the following is a constraint of using NLB cluster in unicast mode that you will need to design for?
answer
You will need separate cluster and management network adapters if you manage the nodes from a deferent TCP/IP subnet than the cluster network
question
What is the function of the port rules in an NLB cluster?
answer
They define which ports are balanced among the host of the cluster
question
When configuring a port rule for an NLB cluster with the "multiple host" filtering mode selected, which of the following statements is most correct pertaining to the affinity configuration?
answer
Selecting the "single" options will force a single cluster node to ho dale all client requests from a specific client
question
There are many requirements that must be met in order to build a failover cluster using Windows Server 2012. Which of the items listed here is not an requirement you must meet?
answer
All servers must be joined to an Active Directory domain
question
In a failover cluster configured on Windows Server 2012,how are heartbeats transmitted?
answer
Using UPD port 3343 unicast
question
When failover cluster connect to, and use,a shared storage device using Fibre Channel, what name is given to the Fibre Channel network?
answer
The fabric
question
How are storage devices typically assigned to only a single cluster on the network?
answer
By using LUN masking or zoning
question
Which PowerShell cmdlet would be used to add a new resource group to a failover cluster configuration?
answer
Add-ClusterGroup
question
What mode of Cluster Aware Update has an administrator triggering the updates manually from the orchestrator?
answer
Remote-updating mode
question
Cluster running on which of the following operating systems are supported for migration to Windows Server 2012? (Choose all that apply)
answer
Windows Server 2008 Windows Server 2008 R2
question
Which quorum type allows the cluster to continue to function as long as one node is available and the disk are online?
answer
No Majority (Disk Only)
question
Which quorum type is recommended for clusters with an odd number of nodes?
answer
Node Majority
question
Which quorum type is recommended for clusters with an even number of nodes?
answer
Node and Disk Majority
question
The High Availability Wizard allows you to configure several pre-selected high availability roles in a cluster. Which of the following are options that are available to choose from? (Choose all that apply)
answer
Distributed Transactions Coordinator(DTC) Exchange Server
question
What we management functionality is introduced with SMB 3.0?
answer
PowerShell cmdlet for SMB
question
Which if the following feature are not supported on the Scale-Out File Server? (Choose all that apply)
answer
DFS replication File Server Resource Manager NFS
question
When configuring the failure threshold on the Failover tabs, you can opt to leave the cluster in a failed state by configuring what two options? (Choose two answers)
answer
The maximum number of failures that can occur The length of time in hours
question
When using VM Monitoring for Hyper-V VMs, into what event log will events be logged when a monitor service is deemed to be unhealthy?
answer
System
question
If a monitored VM is gracefully restarted on its current Hyper-V host and it's subsequently fails again, what will VM Monitoring next attempt?
answer
Move the VM to another cluster node and restart it again
question
Which of the following features of the General Use File Server clustering role is the only chance fromWindows Server 2008 R2 to Windows Server 2012?
answer
Support for SMB3.0
question
When creating a new General Use File Server role, which SMB setting are enable by default,but can be disabled if desired? (Choose all that apply)
answer
Enable continuous availability Encrypt data access
question
Which SMB 3.0 feature minimizes processor utilization when performing large file I/O operations?
answer
SMB Direct
question
Server Message Block (SMB) 3.0 provides many changes that add functionality and improve performance. Which of the following features allows users to scale shared bandwidth by adding cluster nodes?
answer
SMB Scale Out
question
Server Message Block (SMB) 3.0 provides many changes that add functionality and prove performance. Which of the following features encrypts traffic?
answer
SMB Encryption
question
In regard toLive Migration, which of the following prerequisites must be met before attempting the Live Migration? (Choose all that apply)
answer
All the hosts must use processors from the same manufacturer All VM must be configured to use OVH format disks on SCSI disks
question
When performing a Live Migration, there are several options available to choose from that control how the how the LM will occur. Which if the following is not one of these options?
answer
Move only the snapshots files
question
Quick Migration occurs within the confines of what?
answer
A failover cluster
question
If you want to use an exported VM as a template to create multiple VMs, what should you do on the source VM before performing the export?
answer
Run sysprep
question
Which of the following VM file formats can be migration using theV2V method by Microsoft System Center Virtual Machine Manager? (Choose all that apply)
answer
OVF VMware Citrix XenServer
question
When performing a P2V migration using SCVMM, there are several limitations that must be observed. Which of the following source server specifications would be disqualify it from a P2V migration? (Choose all tat apply)
answer
256 MB of RAM installed Use BitLicker Drive Encryption on the data volume
question
When performing a P2V migration using SCVMM, there are several limitations that must be observed. Which of the following source operating systems would be disqualified from a P2V migration?
answer
Windows Server 2003 SP1 32-bit
question
Offline P2V migrations are the only available migration method for what types of sources servers? (Choose all that apply)
answer
Servers with FAT32 volumes Servers that are domain controllers
question
When performing a Live Migration using the "Move the virtual machine's data by selecting where to move the items" option, which of the following advanced options would be the best to choose from if you need to select a specific location on the destination server for each of the VMs to be moved to?
answer
Move the VM's hard disk to different locations
question
What is the process by which you move the storage of a VM from one physical server to another without a cluster?
answer
Storage Migration
question
What is the process by which you move an entire VM or part if a VM to another physical servers sing a cluster?
answer
Quick Migration
question
When configuring UNIX Attributes for an Active Directory user account, which of the following attributes is not available for configuration?
answer
Login script
question
Which of the following protocols is not supported by BranchCache?
answer
NFS
question
Distribute cache mode is designed for branch offices with what number of clients?
answer
Fewer than 50
question
When configuring the BranchCache hash publication options in Group Policy, you have three options available. Which of the options listed here is not available to configure?
answer
Disallow hash publication on shared folders on which BranchCache is not enabled
question
What can you use to configure automatic procedures for defining a desired property on a file based on the conditions specified in a rule?
answer
File classification
question
Before you can audit access to files, what must you first do? (Choose all that apply)
answer
Specify files to be audited
question
What feature, first available in Windows 7 and Windows Server 2008, enables you to configure object access auditing for every file and folder on the computer's file system?
answer
Global Object Access Auditing
question
What can be configured to create targeted audit policies based on resource properties, and expressions, so that you don't have to audit every file?
answer
Dynamic Access Control
question
How is Identity Manager for UNIX installed?
answer
Using dism.exe
question
When a file is accessed using NFS, what attributes are used by the NFS server to determine if the user has the required permissions to access the file?
answer
UID and GID
question
Which of the following terms is best described as giving access to a user?
answer
Authorization
question
Select the proper PowerShell cmdlet from this list that is used to configure BranchCache in local caching mode.
answer
Enable-BCLocal
question
Select the proper PowerShell cmdlet from this list that is used to increase the BranchCache in storage space.
answer
Add-BCDataCacheExtension
question
Which of the following statements are true concerning Kerberos armoring? (Choose all that apply)
answer
Fully encrypts Kerberos messages Increases Kerberos processing time
question
Claims authorization relies on what?
answer
The Kerberos KDC
question
After you claim types, what is the next step you must perform to allow the claim to function properly?
answer
Configure resource properties
question
What is created so that files are automatically scanned and classified based on their content?
answer
Classification rules
question
From what locations in Windows Server 2012 can you set classifications on files and folders? (Choose all that apply)
answer
On the folder Properties dialog box In the File Server Resource Manager console
question
What Windows Server 2012 feature allows you to define computer-wide auditing of the file system or the registry?
answer
Global Object AccessAudeting
question
Which of the listed PowerShell cmdlet a would be correctly used to modify a Central Access Policy in Active Directory?
answer
Set-ADCentralAccessPolicy
question
Which of the following would you skip in your planning for deploying Access-Denied Assistance?
answer
The share size where Access-Denied Assistance will be used
question
After you have deployed a proposed Dynamic Access Control policy in staging mode, how do you check to see what is happening?
answer
Look in the Security logs for Event ID 4818
question
To use claims-based authorization Ina domain, which of the following items must you have?
answer
Domain Controllers running Windows Server 2012 Ina domain
question
Regarding Dynamic Access Control, which term describes the process that issues a token to the user?
answer
Trust identity provider
question
How are NAS devices typically accessed over the network?(choose all that apply)
answer
Using SMB Using NFS
question
What is the name of the high-availability technology that establishes multiple sessions or connections to the Fibre Channel storage array by using redundant path components such as switches, adapter, and cables?
answer
Multipath I/O
question
Which Hyper-V disk management command would you need to use to reduce the file size if a virtual hard disk?
answer
Compact
question
What is the name given to the new Windows Server 2012 capability that allows an administrator to completely remove binaries from the disk for an unneeded role or feature?
answer
Feature on Demand
question
Which of the following PowerShell cmdlet correctly removes the BitLocker feature and all if it's binaries from the disk?
answer
Uninstall-WindowsFeature BitLocker-Remove
question
How are SAN devices typically accessed over the network? (Choose all that apply)
answer
Using Fiber Channel Using iSCSI
question
Fiber Channel of Ethernet ( FCoE) is capable of_____ per second or more.
answer
10 gigabit
question
You have just attached an iSCSI device to a server running Windows Server 2012. The disk does not show up in Windows Explorer. What is the best way to make the disk available to the server for usage?
answer
Rescan disks inDisk Manager
question
Which of the followingHyper-V disk types is characterized as only allocating the amount of physical disk space that is required at that point in time, while still being able to grow to a fixed limit?
answer
Dynamically expanding disk
question
Which term corresponds to an entity that's sends SCSI commands to iSCSI storage devices?
answer
iSCSI Initiator
question
Which term corresponds to unique identifiers in an iSCSI network?
answer
iSCSI Qualified Name
question
Which term corresponds to an entity that receives iSCSI commands?
answer
iSCSI Target
question
How can you manage the Windows Server Backup feature that has been installed on a server that only has the Server Core installation?
answer
Use the command-line backup tool Use RSAT from another computer Use the a Windows Server Backup MMC for another computer Use PowerShell cmdlets
question
What is contained within the Backup folder created by Windows Server Backup?
answer
Virtual hard disk (VHD) files that are basically duplicates of your volumes XML files that provide backup history details
question
When you select the "Foster backup performance" option for your backups, what is the net result of this configuration?
answer
Incremental backups are performed Windows keeps a shadow copy of the source volume
question
Which of the following items is not a limitation to keep in mind when deciding to use Windows Online Backups?
answer
Files and fosters (data) cannot be backed up
question
By default where will backups of DHCP be sent when you configure backups to occur?
answer
%systemroot%WindowsSystem32DhcpBackup
question
What type of backup allows you to recover the server to another server with the same or different hardware?
answer
Bare metal recovery
question
What type of backup allows to recover the server to a Windows Recovery Environment?
answer
System reserved
question
When performing a copy or a file from a volume protected by Shadow Copies for Shared Volumes, what is the 915 407 6568 between a copy and a restore?
answer
A copy will result in the file being placed into a different location from where it was backed up A restore will delete the current version of the file that exists
question
Which of the following items should you keep in mind when performing a restoration if a system volume using WinRe?(choose all that apply)
answer
If there are any data volumes on the same disk that contain the system volumes, they will be erased as of the part of restore process These server's current system volumes will be erased and replaced with restored system volume The server's hardware must not have changed and your data volumes must still be operational
question
Which of the following backup configurations does not include the system state data?
answer
Incremental backups
question
From within a Windows session, what methods are available to reboot a domain controller into DSRM?(choose all that apply)
answer
Use the bcdedit/set safe boot dsrepair command Use msconfig to configure the server to reboot into DSRM
question
The Boot configuration Data (BCD) store contains information that controls how your server boots and replaces what file previously used for this function?
answer
boot.ini
question
Which of the following sol lowing system state items will only be found on a domain controller?
answer
SYSVOL
question
Which Advance Boot option would be most appropriate of you needed to boot a problematic server and needed to download a new video card driver?
answer
Safe Mode with Networking
question
Which Advance Boot option would be most appropriate if you wanted to troubleshoot a problematic server that you suspected might be infected with malware?
answer
SafeMode
question
Which Advance Boot options would be most appropriate if you wanted to roll back to a previous state followings server problem?
answer
Last Know Good Configurations
question
What must you use to apply encryption to replication traffic for Hyper-V replica?
answer
X.509
question
What extensions must be present in the enhanced key usage (EKU) section of the digital certificate to be use for Hyper-V replica?(choose all that apply)
answer
Client Authentication Server Authentication
question
When configuring the subject common name ( CN) on an X.509 digital certificate to be used for Hyper-V replication, what value should be used for the subject CN IF a standalone server host the VM?
answer
The FQDN of the Hyper-V host
question
In order to digital certificate to be considered valid, what conditions must it generally meet?(choose all that apply)
answer
The certificate must terminate at a valid root certificate The certificate must not be expired or revoked
question
In what way might using a multi-site failover cluster to provide Hyper-V VMs be better option than using Hyper-V replication?
answer
A multi-site cluster automatically fails over the cluster service or application to another
question
When configuring a multi-site cluster using Windows Server 2012, how can you configure data replication to occur?(choose all that apply)
answer
Block level hardware-based replication Software-based file replication Application -based replication
question
What network services will you required in the remote site used to host a multi-site cluster?(choose all that apply)
answer
AD Domain Services DNS
question
In a Windows Server 2012 failover cluster, after how many missed heartbeats in a row will a node become failed?
answer
5
question
Which of the following quorum configurations would not be acceptable for a multi-site cluster configuration?(choose all that apply)
answer
Node Majority No Majority
question
Which component of the Hyper-V replica feature manages replication configuration details?
answer
Replication engine
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New