Download Installation, Storage, and Compute with Windows Server 2016.70-740.PrepAway.2019-07-21.167q.vcex

Vendor: Microsoft
Exam Code: 70-740
Exam Name: Installation, Storage, and Compute with Windows Server 2016
Date: Jul 21, 2019
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory forest. 
You install Windows Server 2016 on 10 virtual machines. 
You need to deploy the Web Server (IIS) server role identically to the virtual machines. 
Solution: From a Group Policy object (GPO), you create an application control policy, and then you apply the policy to the virtual machines.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory forest. 
You install Windows Server 2016 on 10 virtual machines. 
You need to deploy the Web Server (IIS) server role identically to the virtual machines. 
Solution: You create a software installation package, and then you publish the package to the virtual machines by using a Group Policy object (GPO).
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 3
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a server named Server1 that runs Windows Server 2016. 
Server1 hosts a line-of-business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. 
You need to log an event in the Application event log whenever App1 consumes more than 4 GB of memory. 
Solution: You create a performance counter data collector.
Does this meet the goal?
  1. Yes
  2. No 
Correct answer: B
Question 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a server named Server1 that runs Windows Server 2016. 
Server1 hosts a line-of-business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. 
You need to log an event in the Application event log whenever App1 consumes more than 4 GB of memory. 
Solution: You create a performance counter alert data collector.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Question 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a server named Server1 that runs Windows Server 2016. 
Server1 hosts a line-of-business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. 
You need to log an event in the Application event log whenever App1 consumes more than 4 GB of memory. 
Solution: You create a system configuration information data collector.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 6
You have a Hyper-V host named Server1 that runs Windows Server 2016. 
Server1 has a virtual machine named VM1. VM1 is configured to run the Docker daemon. 
On VM1, you have a container network that uses transparent mode. 
You need to ensure that containers that run on VM1 can obtain IP addresses from DHCP. 
What should you do?
  1. On VM1, run Get-VMNetworkAdapter-VMName VM1 | Set-VMNetworkAdapter –MacAddressSpoofing On.
  2. On VM1, run docker network connect.
  3. On Server1, run docker network connect.
  4. On Server1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter –MacAddressSpoofing On.
Correct answer: D
Explanation:
To use DHCP for IP assignment on a virtual container host enable MACAddressSpoofing If the container host is virtualized, and you wish to use DHCP for IP assignment, you must enable MACAddressSpoofing on the virtual machine's network adapter. Otherwise, the Hyper-V host will block network traffic from the containers in the VM with multiple MAC addresses.  You can enable MACAddressSpoofing with this PowerShell command:PS C:> Get-VMNetworkAdapter -VMName ContainerHostVM | Set-VMNetworkAdapter -MacAddressSpoofing OnReferences:https://docs.microsoft.com/en-us/virtualization/windowscontainers/container-networking/advanced
To use DHCP for IP assignment on a virtual container host enable MACAddressSpoofing If the container host is virtualized, and you wish to use DHCP for IP assignment, you must enable MACAddressSpoofing on the virtual machine's network adapter. 
Otherwise, the Hyper-V host will block network traffic from the containers in the VM with multiple MAC addresses.  
You can enable MACAddressSpoofing with this PowerShell command:
PS C:> Get-VMNetworkAdapter -VMName ContainerHostVM | Set-VMNetworkAdapter -MacAddressSpoofing On
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/container-networking/advanced
Question 7
You have a server named Server1 that runs Windows Server 2016. 
You plan to deploy Internet Information Services (IIS) in a Windows container. 
You need to prepare Server1 for the planned deployment. 
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 
Correct answer: To work with this question, an Exam Simulator is required.
Question 8
You have a server that runs Windows Server 2016. 
The server contains a storage pool named Pool1. Pool1 contains five physical disks named Disk1, Disk2, Disk3, Disk4, and Disk5. 
A virtual disk named VirtualDisk1 is stored in Pool1. VirtualDisk1 uses the parity storage layout. 
Disk3 fails. 
You need to remove Disk3 from Pool1. 
Which two commands should you run? Each correct answer presents part of the solution.
  1. Update-StoragePool –FriendlyName Pool1
  2. Set-ResiliencySetting –StoragePool Pool1 –PhysicalDiskRedundancyDefault 4
  3. Reset-PhysicalDisk –FriendlyName Disk3 
  4. Set-PhysicalDisk –FriendlyName Disk3 –Usage Retired
  5. Remove-PhysicalDisk –FriendlyName Disk3
Correct answer: DE
Question 9
You have an Active Directory domain named Contoso.com. The domain contains servers named Server1, Server2 and Server3 that run Windows Server 2016. 
Server1 and Server 2 are nodes in a Hyper-V cluster named Cluster1. You add a Hyper-V Replica Broker role named Broker1 to Cluster1. 
Server3 is Hyper-V server. A virtual machine VM1 runs on Server3. 
Live Migration is enabled on all three servers and it is configured to use Kerberos authentication only. 
You need to ensure that you can perform the migration of VM1 to Server2. 
What should you do?
  1. Modify the Storage Migration settings on Server3.
  2. Modify the Cluster permissions for Cluster1.
  3. Add the Server3 computer account to the Replicator group on Server1 and Server2.
  4. Modify the Delegation settings of the Server3 computer account.
Correct answer: D
Explanation:
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation. This involves modifying the Delegation settings of the source server, which is Server3 in this instance. References:https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspx#BKMK_Step1
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation. This involves modifying the Delegation settings of the source server, which is Server3 in this instance. 
References:
https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspx#BKMK_Step1
Question 10
You have a Windows Server 2016 Hyper-V failover cluster that contains two nodes named Node1 and Node2. 
On Node1, you create a virtual machine named VM01 by using Hyper-V Manager. 
You need to configure VM01 to move to Node2 automatically if Node1 becomes unavailable. 
What should you do?
  1. From Failover Cluster Manager, run Configure Role actions.
  2. From Hyper-V Manager, click VM01, and click Enable Replication.
  3. From Hyper-V Manager, click Node1, and then modify the Hyper-V settings.
  4. From Windows PowerShell, run the Enable-VMReplicationcmdlet.
Correct answer: A
Explanation:
If you have VMs on cluster nodes that are not currently cluster resources, it's a simple process to make them highly available, provided they're using cluster storage (such as a Cluster Shared Volume):Start Failover Cluster Manager. Expand the cluster Roles. Select the Configure Role... action. Click Next to the introduction wizard. In the Select Role dialog box, select Virtual Machine as the type and click Next. Select all the virtual machines you want to make highly available and click Next. Click Next to the confirmation. Click Finish to the report, which should show Success for all. If there are Warnings, check and resolve problems if needed References:http://windowsitpro.com/hyper-v/make-vm-highly-available-windows-server-2012
If you have VMs on cluster nodes that are not currently cluster resources, it's a simple process to make them highly available, provided they're using cluster storage 
(such as a Cluster Shared Volume):
  1. Start Failover Cluster Manager. 
  2. Expand the cluster Roles. 
  3. Select the Configure Role... action. 
  4. Click Next to the introduction wizard. 
  5. In the Select Role dialog box, select Virtual Machine as the type and click Next. 
  6. Select all the virtual machines you want to make highly available and click Next. 
  7. Click Next to the confirmation. 
  8. Click Finish to the report, which should show Success for all. If there are Warnings, check and resolve problems if needed 
References:
http://windowsitpro.com/hyper-v/make-vm-highly-available-windows-server-2012
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!