{"id":343,"date":"2018-11-14T15:39:52","date_gmt":"2018-11-14T14:39:52","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=343"},"modified":"2018-11-14T15:49:17","modified_gmt":"2018-11-14T14:49:17","slug":"mcsa-70-740-exam-preparation-p5","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=343","title":{"rendered":"MCSA 70-740 Exam preparation P5"},"content":{"rendered":"<p><strong>MCSA 70-740<\/strong><\/p>\n<p><strong>Topic: Implementing of Hyper-V<\/strong><\/p>\n<p>Your network includes two Hyper-V hosts called Server1 and Server2. The Windows Server 2016 operating system is installed on both servers.<\/p>\n<p>The following virtual switches are configured on Server1 and Server2:<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-344 size-full\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv1.png\" alt=\"\" width=\"914\" height=\"154\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv1.png 914w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv1-300x51.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv1-768x129.png 768w\" sizes=\"auto, (max-width: 914px) 100vw, 914px\" \/><\/a><\/p>\n<p>The hyper hosts provide the following virtual machines (VMs):<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-345 size-full\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv2.png\" alt=\"\" width=\"676\" height=\"408\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv2.png 676w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/hyperv2-300x181.png 300w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/a><\/p>\n<p>All virtual machines have IP addresses from the address range 192.168.1.0\/24. VLANs are configured in Hyper-V only. No VLANs are configured for the physical switches.<\/p>\n<p>Which virtual machine(s) can VM1 connect to?<\/p>\n<p>Answer: <strong>VM2 and VM5<\/strong><\/p>\n<hr \/>\n<p>Your network contains two Hyper-V hosts named Server1 and Server2. Server1 has the Windows Server 2012 R2 operating system installed. Server2 has Windows Server 2016 installed.<\/p>\n<p>You perform the live migration of a virtual machine (VM) named VM1 from Server1 to Server2.<\/p>\n<p>You must create a production checkpoint for VM1 on Server2.<\/p>\n<p>What three cmdlets are you running in order?<\/p>\n<p>Answer: <strong>Stop-VM, Update VM-Version, Checkpoint-VM<\/strong><\/p>\n<hr \/>\n<p>Your network includes an Active Directory domain services (AD DS) domain called cybercop-training.ch. The computers on the network are installed using Windows Provisioning Services (WDS).<\/p>\n<p>The domain contains a member server named Server1. Server1 has the Windows Server 2016 operating system installed. Server1 is configured as a Hyper-V host. Virtual machines (VMs) deployed on Server1 are connected to an external switch called vSwitch1.<\/p>\n<p>You create a new virtual machine named VM1 on Server1. To create, use the following PowerShell cmdlets:<\/p>\n<p><strong><code>New VM VM1<\/code><\/strong><br \/>\n<strong><code>Add-VMHardDiskDrive -VMName VM1 -ControllerType IDE -Path C:\\VMs\\Disk1.vhd<\/code><\/strong><br \/>\n<strong><code>Add-VMNetworkAdapter -VMName VM1<\/code><\/strong><\/p>\n<p>You need to make sure that you can install the operating system on VM1 using Windows Provisioning Services (WDS).<\/p>\n<p>What do you do? <strong>Add an older network adapter to VM1<\/strong>.<\/p>\n<hr \/>\n<p>Your network includes a Hyper-V host called Server1. Server1 has the Windows Server 2016 operating system installed. Server1 hosts a virtual machine called VM1.<\/p>\n<p>You must allow VM1 direct access to a graphics processing unit (GPU) of Server1.<\/p>\n<p>What is your first step?<\/p>\n<p>Answer: <strong>Disable the video card on Server1.<\/strong><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Your network includes a Hyper-V host called Server1. Server1 has the Windows Server 2016 operating system installed. Server1 hosts a virtual machine that uses a virtual hard disk (VHD) named Disk1.vhdx.<\/p>\n<p style=\"text-align: justify;\">You find the following entry in the event log:<\/p>\n<p style=\"text-align: justify;\">One or more virtual disks have a physical sector size that is smaller than the physical sector size of the memory on which the virtual disk file is stored.<\/p>\n<p style=\"text-align: justify;\">You must remove the cause of the warning.<\/p>\n<p style=\"text-align: justify;\">What do you do?<\/p>\n<p style=\"text-align: justify;\">Answer:<strong> Use the Cmdlet Set-VHD<\/strong><\/p>\n<p style=\"text-align: justify;\">Explanation: You can use the PhysicalSectorSizeBytes parameter of the Set-VHD cmdlet to specify the physical sector size of a virtual hard disk in VHDX format. The size is specified in bytes. Valid values are 512 or 4096.<\/p>\n<hr \/>\n<p>Your network includes a virtual machine called VM1. VM1 has the Windows Server 2016 operating system installed. VM1 hosts a service that causes high network throughput.<\/p>\n<p>VM1 has a virtual network adapter that is connected to a Hyper-V switch called vSwitch1. vSwitch1 uses a network card. The network card supports Remote Direct Memory Access (RDMA), Single Root I\/O Virtualization (SR-IOV), Quality of Service (QoS), and Receive Side Scaling (RSS).<\/p>\n<p>You must ensure that VM1 traffic can be processed by multiple network processors.<\/p>\n<p>What PowerShell cmdlet are you running?<\/p>\n<p>Answer: <code><strong><span id=\"lblA1\">Set-NetAdapterRss<\/span><\/strong><\/code><\/p>\n<hr \/>\n<p>Your network includes an Active Directory domain services (AD DS) domain called cybercop-training.ch. The domain contains two Hyper-V hosts.<\/p>\n<p>You must perform live migrations between the two hosts.<\/p>\n<p>You must ensure that the live migration traffic is authenticated using Kerberos.<\/p>\n<p>What is your first step?<\/p>\n<p>Answer: <strong>Use the Active Directory Users and Computers snap-in and configure delegation settings in the properties of the computer accounts of the two Hyper-V hosts.<\/strong><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Your network contains a server named Server1. Server1 has the Windows Server 2016 operating system installed. Server1 serves as a Hyper-V host and provides a virtual machine (VM) called VM1.<\/p>\n<p style=\"text-align: justify;\">Server1 has three network adapters connected to virtual switches named vSwitch1, vSwitch2, and vSwitch3.<\/p>\n<p style=\"text-align: justify;\">You configure a NIC team operation on VM1. Your configuration is shown in the following figure:<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/nic_teaming1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-349 size-large\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/nic_teaming1-802x1024.png\" alt=\"\" width=\"802\" height=\"1024\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/nic_teaming1-802x1024.png 802w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/nic_teaming1-235x300.png 235w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/nic_teaming1-768x981.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/nic_teaming1.png 913w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/a><\/p>\n<p>Answer: <strong>Use the Hyper-V Manager on Server1 and change the settings of VM1.<\/strong><br \/>\n<strong>(NIC-Team Operation)<\/strong><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Your company has 10 company locations. Each site has a local network containing multiple Hyper-V hosts. All Hyper-V hosts have the Windows Server 2016 operating system installed. All sites are interconnected by high-speed, low-latency WAN connections.<\/p>\n<p style=\"text-align: justify;\">You need to ensure that you can create QoS policies for live migrations between sites.<\/p>\n<p style=\"text-align: justify;\">What do you install?<\/p>\n<p>Answer: <strong>The Feature Data Center Bridging.<\/strong><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Your network includes a physical server called Server1. Server1 has the Windows Server 2016 operating system installed. The server is configured as a Hyper-V host.<\/p>\n<p style=\"text-align: justify;\">On Server1, you create a virtual machine called VM1. Then install Windows Server 2016. You want to use the Hyper-V role on VM1. You must ensure that you can use VM1 to run virtual machines.<\/p>\n<p style=\"text-align: justify;\">How do you complete the PowerShell script shown in the figure?<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/set_parameter1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-350 size-large\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/set_parameter1-1024x311.png\" alt=\"\" width=\"1024\" height=\"311\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/set_parameter1-1024x311.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/set_parameter1-300x91.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/set_parameter1-768x233.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/set_parameter1.png 1433w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>Answer: <strong>P1: $true \/ P2: $false<\/strong><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Your network contains a server named Server1. Server1 has Windows Server 2016 with the role Hyper-V installed.<\/p>\n<p style=\"text-align: justify;\">Server1 is equipped with two network cards. Both network cards support Remote Direct Memory Access (RDMA).<\/p>\n<p style=\"text-align: justify;\">You want to bundle the bandwidth of the two network cards and deploy them to a virtual machine running on Server1. Your solution must ensure that the virtual machine can use RDMA.<\/p>\n<p style=\"text-align: justify;\">What command are you running?<\/p>\n<p>Answer: <span id=\"lblA4\"><code><b>New-VmSwitch<\/b><\/code> -Name Production -NetAdapterName &#171;NIC1&#187;, &#171;NIC2&#187; <code><b>-EnableEmbeddedTeaming<\/b><\/code> $true<\/span><\/p>\n<hr \/>\n<p>You are an administrator for the company Cybercop-training.ch. You have a Windows Server 2016 Hyper-V environment.<\/p>\n<p>The configuration of the Hyper-V servers is shown in the following table:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-353\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config2-1024x412.png\" alt=\"\" width=\"1024\" height=\"412\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config2-1024x412.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config2-300x121.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config2-768x309.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config2.png 1048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\">You must ensure that you can move virtual machines (VMs) between hosts without disconnecting the virtual machines from the network.<\/p>\n<p style=\"text-align: justify;\">1: You implement Hyper-V replication between Host2 and Host4.<\/p>\n<p style=\"text-align: justify;\">Does this match your goal?<\/p>\n<p style=\"text-align: justify;\">Answer: <strong>No<\/strong><\/p>\n<p style=\"text-align: justify;\">2: You use Host3 and Host4 to implement live migration.<\/p>\n<p style=\"text-align: justify;\">Does this match your goal?<\/p>\n<p style=\"text-align: justify;\">Answer: <strong>No<\/strong><\/p>\n<p style=\"text-align: justify;\">3: You use Host1 and Host2 to implement live migration.<\/p>\n<p style=\"text-align: justify;\">Answer: <strong>No<\/strong><\/p>\n<p style=\"text-align: justify;\">Explanation:<\/p>\n<p style=\"text-align: justify;\">In general, live migration would be a suitable solution. In this specific case, however, the names of the virtual switches on Host1 and Host2 differ. If a VM is moved from Host1 to Host2, it cannot connect to Switch1 on Host2 and loses its network connectivity as a result.<\/p>\n<p style=\"text-align: justify;\">Virtual machine migration is only possible between hosts with processors from the same vendor.<\/p>\n<p style=\"text-align: justify;\">A valid solution would be to implement live migration using Host1 and Host3.<\/p>\n<hr \/>\n<p>Your network includes a Hyper-V host called Server1. Server1 has the Windows Server 2016 operating system installed. The server hosts the following four virtual machines (VMs):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-354\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config3-1024x246.png\" alt=\"\" width=\"1024\" height=\"246\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config3-1024x246.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config3-300x72.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config3-768x184.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/10\/config3.png 1492w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>With which virtual machine(s) can you connect to a console session using &#171;Connect to Virtual Machines&#187;?<\/p>\n<p>Answer: <strong>Only with VM3 and VM4<\/strong><\/p>\n<hr \/>\n<p>Your network includes an Active Directory Domain Services (AD DS) domain called cybercop-training.ch. The functional level of the overall structure and the functional level of the domain are defined with Windows Server 2008 R2.<\/p>\n<p>The Windows Server 2016 Standard operating system is installed on all servers in the domain. The domain contains 300 client computers running either Windows 8.1 or Windows 10.<\/p>\n<p>The domain contains nine servers. The configuration of the servers is shown in the following table:<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td><strong>Name<\/strong><\/td>\n<td><strong>Configuration<\/strong><\/td>\n<td><strong>Planed changes<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Server1<\/td>\n<td>Domaincontroller<\/td>\n<td>none<\/td>\n<\/tr>\n<tr>\n<td>Server2<\/td>\n<td>Fileserver<\/td>\n<td>config of Fileserverclustering and storage spaces direct<\/td>\n<\/tr>\n<tr>\n<td>Server3<\/td>\n<td>Fileserver<\/td>\n<td>config of Fileserverclustering and storage spaces direct<\/td>\n<\/tr>\n<tr>\n<td>Server4<\/td>\n<td>Hyper-V Host<\/td>\n<td>Provide shielded VMs<\/td>\n<\/tr>\n<tr>\n<td>Server5<\/td>\n<td>Hyper-V Host<\/td>\n<td>none<\/td>\n<\/tr>\n<tr>\n<td>Server6<\/td>\n<td>Memberserver<\/td>\n<td>Provide Active Directory Federation Services<\/td>\n<\/tr>\n<tr>\n<td>VM1<\/td>\n<td>VM on Server5<\/td>\n<td>none<\/td>\n<\/tr>\n<tr>\n<td>VM2<\/td>\n<td>VM on Server5<\/td>\n<td>none<\/td>\n<\/tr>\n<tr>\n<td>VM3<\/td>\n<td>VM on Server5<\/td>\n<td>none<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The virtual machines are configured as follows:<\/p>\n<ul>\n<li>Each virtual machine has a virtual network adapter.<\/li>\n<li>VM1 and VM2 are part of a network load balancing cluster (NLB cluster).<\/li>\n<li>All servers on the network can communicate with all virtual machines.<\/li>\n<\/ul>\n<p>You need to minimize the probability that a virtual machine running malware will consume an excessive amount of Server5&#8217;s system resources.<\/p>\n<p>What do you do?<\/p>\n<p>Answer: Run the<strong> Set-VMProcessor<\/strong> cmdlet in conjunction with the <strong>EnableHostResourceProtection<\/strong> parameter.<\/p>\n<hr \/>\n<p>Your company uses an application called App1. App1 is distributed across multiple virtual machines (VMs) in a multi-client Hyper-V environment.<\/p>\n<p>You need to ensure that App1 traffic is evenly distributed among virtual machines hosting App1.<\/p>\n<p>What do you include in your environment?<\/p>\n<p>Answer: <strong>The network controller and Windows Server Software Load Balancing (SLB).<\/strong><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>MCSA 70-740 Topic: Implementing of Hyper-V Your network includes two Hyper-V hosts called Server1 and Server2. The Windows Server 2016 operating system is installed on <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=343\" title=\"MCSA 70-740 Exam preparation P5\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,20],"tags":[],"class_list":["post-343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exam-preparation","category-system-administration"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=343"}],"version-history":[{"count":6,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":356,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/343\/revisions\/356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/307"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}