Installation, Storage, and Compute with Windows Server 2016 v1.0 (70-740)

Page:    1 / 19   
Total 280 questions

Your company has 10 offices. Each office has a local network that contains several Hyper-V hosts that run Windows Server 2016. All of the offices are connected by high speed, low latency WAN links.
You need to ensure that you can use QoS policies for Live Migration traffic between the offices. Which component should you install?

  • A. the Multipath I/O feature
  • B. the Routing role service
  • C. the Network Controller server role
  • D. the Canary Network Diagnostics feature
  • E. the Data Center Bridging feature


Answer : CE

Explanation:

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
You have a Hyper-V host named Server1 that runs Windows Server 2016. You plan to deploy several shielded virtual machines on Server1. You deploy a Host
Guardian on a new server.
You need to ensure that Server1 can host shielded virtual machines.
What should you run first?

  • A. the Mount-VHD cmdlet
  • B. the Diskpart command
  • C. the Set-VHD cmdlet
  • D. the Set-VM cmdlet
  • E. the Set-VMHost cmdlet
  • F. the Set-VMProcessor cmdlet
  • G. the Install-WindowsFeature cmdlet
  • H. the Optimize-VHD cmdlet


Answer : G

Explanation:

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server
2016. The servers have the same hardware configuration.
You need to asynchronously replicate volume F: from Server1 to Server2.
What should you do?
parameter.
B. Install the Failover Clustering feature and create a new cluster resource group.
C. Install the Failover Clustering feature and use Cluster Shared Volumes (CSV). parameter.



Answer : A

Explanation:

You have a Nano Server named Nano1. You deploy several containers to Nano1 that use an image named Image1. You need to deploy a new container to Nano1 that uses Image1. What should you run?

  • A. the Install-NanoServerPackage cmdlet
  • B. the Install-WindowsFeature cmdlet
  • C. the docker load command
  • D. the docker run command


Answer : D

Explanation:

You deploy a Hyper-V server named Served in an isolated test environment. The test environment is prevented from accessing the Internet. Server1 runs the
Datacenter edition of Windows Server 2016. You plan to deploy the following guest virtual machines on the server:


Which activation model should you use for the virtual machines?

  • A. Multiple Activation Key (MAK)
  • B. Automatic Virtual Machine Activation (AVMA)
  • C. Original Equipment Manufacturer (OEM) key
  • D. Key Management Service (KMS)


Answer : B

Explanation:

Note: In this section, you'll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.
On Server1, you have the following zone configuration:


You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients.
Solution: From a Group Policy object (GPO) in the domain, you modify the Network List Manager Policies (NLMP).
Does this meet the goal?

  • A. Yes
  • B. No


Answer : B

Explanation:

Note: In this section, you'll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.
On Server1, you have the following zone configuration:


You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients.
Solution: From Windows PowerShell on Server1, you run the Add-DnsServerTrustAnchor cmdlet.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : B

Explanation:

You have a server named Server1 that runs Windows Server 2016. The disk configuration for Server1 is shown in the exhibit:


You add Server1 to a cluster. You need to ensure that you can use Disk 1 for Storage Spaces Direct.

  • A. Delete Partition (E:)
  • B. Set Disk 1 to offline
  • C. Convert Disk 1 to a dynamic disk
  • D. Convert Partition (E:) to ReFS


Answer : A

Explanation:

You have a Scale-Out File Server that has a share named Share1. Share1 contains a virtual disk file named Disk1.vhd.
You plan to create a guest failover cluster.
You need to ensure that you can use the virtual disk as a shared virtual disk for the guest failover cluster.
Which cmdlet should you use?

  • A. Optimize-VHDSet
  • B. Set-VHD
  • C. Convert-VHD
  • D. Optimize-VHD


Answer : C

References:
https://4sysops.com/archives/hyper-v-cluster-with-shared-vhd-create-vhdx-files-and-cluster/

Your network contains an Active Directory forest named contoso.com.
The forest contains a member server named Server1 that runs Windows Server 2016. Server1 is located in the perimeter network.
You install the Active Directory Federation Services server role on Server1. You create an Active Directory Federation Services (ADFS) farm by using a certificate that has a subject name of sts.contoso com.
You need to enable certificate authentication from the Internet on Server1.
Which two inbound TCP ports should you open on the firewall? Each correct answer presents part of the solution.

  • A. 389
  • B. 443
  • C. 3389
  • D. 8531
  • E. 49443


Answer : BE

Explanation:

Note: In this section, you'll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.
Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. All domain controllers run Windows Server 2012 R2. Contoso com has the following configuration:


You plan to deploy an Active Directory Federation Services (AD FS) farm on Server1 and to configure device registration. You need to configure Active Directory to support the planned deployment.
Solution: You upgrade a domain controller to Windows Server 2016.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : A

Explanation:

Note: In this section, you'll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.
On Server1, you have the following zone configuration:


You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients.
Solution: From the Security setting of each zone on Server1, you modify the permissions.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : B

Explanation:

You have a server named Server1 that runs Windows Server 2016. The Docker daemon runs on Server1.
You need to ensure that members of a security group named Docker Administrators can administer Docker.
What should you do?

  • A. Run the Set-Service cmdlet.
  • B. Modify the Security settings of Dockerd.exe.
  • C. Edit the Configuration.json file.
  • D. Run the sc config command.
  • E. Run the sc privs command.
  • F. Add Docker Administrators to the local Administrators group.
  • G. Modify the Security settings of Docker.exe.


Answer : D

Explanation:
The preferred method for configuring the Docker Engine on Windows is using a configuration file. The configuration file can be found at 'C:\ProgramData\Docker
\config\daemon.json'. If this file does not already exist, it can be created.
The Docker Engine can also be configured by modifying the Docker service using the sc config command.
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/manage-docker/configure-docker-daemon

Note: In this section, you'll see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.
Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.
On Server1, you have the following zone configuration:


You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients.
Solution: From Windows Firewall with Advanced Security on Server1, you create an inbound rule.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : A

Explanation:

You need to modify the GPO prefix by IPAM. What should you do?

  • A. Run the Set-IpamConfiguration cmdlet
  • B. Click Provision the IPAM server in Server Manager
  • C. Click Configure server discovery in Server Manager
  • D. Run the Invoke-lpamGpoProvisioning cmdlet


Answer : A

Explanation:

Page:    1 / 19   
Total 280 questions