单选题Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()AShut down the VMs, and then perform a physical-to-virtual (P2V) conversionBShut down the VMs, and then perform a virtual-to-virtual (V2V) conversionCPerform a physical-to-virtual (P2V) conversion while the VMs are runningDPerform a physical-to-virtual (P2V) conversion while the VMs are shutdown

单选题
Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()
A

Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion

B

Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversion

C

Perform a physical-to-virtual (P2V) conversion while the VMs are running

D

Perform a physical-to-virtual (P2V) conversion while the VMs are shutdown


参考解析

解析: 暂无解析

相关考题:

Your company uses Microsoft Application Virtualization (App - V). Your environment includes multiple client computer configurations, as shown in the following table.You need to deploy a 32 - bit application to all client computers.Which reference computer configuration should you use?()A.Config1 with App - V Sequencer 4.5 32 - bitB.Config2 with App - V Sequencer 4.6 64 - bitC.Config3 with App - V Sequencer 4.6 32 - bitD.Config4 with App - V Sequencer 4.6 64 - bit

Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

Which three of the following are elements of the Cisco Unified Wireless Network?()A、 Unified advanced serviceB、 client devicesC、 Catalyst switchesD、 network managementE、 mesh access pointsF、 VPN concentrator

Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()A、Enable Cluster Shared Volumes (CSVs).B、In Failover Cluster Manager, edit the properties of a single VM.C、In Virtual Network Manager, edit the properties of the virtual network.D、In Hyper-V Manager, take each VM offline and edit the settings of each VM.

Which statement best describes the differences between Cisco SMARTnet and Cisco SMARTnet Onsite?()A、 CiscoSMARTNet Onsite includes all of the elements of Cisco SMARTnet with the additionalprovision of onsite technician to perform parts replacementB、 CiscoSMARTnet Onsite is primarily attractive to customers who do not need to replace theirhardware immediately, but would still like an onsite technician to install and replace hardwareC、 CiscoSMARTnet Onsite includes certification classes and live network consulting at thecustomer siteD、 CiscoSMARTnet Onsite provides network monitoring for small-to-medium sized businesses andprovides onsite technical resources when hardware problems are detecteD

Selling the total solution includes adding services and financing options which ensures your customer will remain satisfied with their purchase. Which of the following best describes the benefits of Selling options, storage, services, and financing to your clients?()A、More face time with the executivesB、Enhanced credibility, higher profits, less competitive pressureC、One source for elements, cleaner design, simpler supportD、Locks competitors out of account

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade. Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network. Which two sets of actions should your plan include?()A、Import the checkpoint into the test environment, and apply the application update for testingB、Create a checkpoint of the three VMs, and export the checkpoint to the test environmentC、Create three VMs in the test environment, attach the existing .vhd files, and apply the application update for testingD、Pause the three VMs, and copy the .vhd files to the test environment

You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to place multiple Hyper-V servers in the perimeter network (also known as DMZ). You need to be able to manage the Hyper-V servers by using VMM.  Which two actions should you perform for each server in the perimeter network?()A、Create a local administrative accountB、Perform a VMM local agent installationC、Open port 8100 in the Windows firewallD、Copy the security file to the VMM Administrator Console, and then run the Add Hosts Wizard

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()A、Use the Remote Desktop Connection Broker and failover clusteringB、Use the Remote Desktop Gateway and network load balancingC、Use network load balancing and failover clusteringD、Use DNS round-robin and network load balancing

You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()A、Use two iSCSI host bus adaptersB、Use two Fibre Channel host bus adaptersC、Place the physical host servers on the same TCP/IP subnetD、Place the physical host servers on different TCP/IP subnets

Your network environment includes the following elements: Two Windows Server 2008 R2 Hyper-V serversTwo VMware ESX 3.5 serversMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2   You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion.  What should you do?()A、Run the New-V2V PowerShell cmdletB、Perform a physical-to-virtual (P2V) conversion while the VMs are runningC、Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionD、Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion

You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()A、a port numberB、an encryption keyC、the VMM server nameD、the URL of the VMM Self-Service Portal

All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue.  What should you do?()A、 Use the nbtstat command-line tool on Client1.B、 Use the pathping command-line tool on Client1.C、 Run the nbtstat -r command on the RRAS server.D、 Run the ping -a Client1 command on the RRAS server.

单选题Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()AEnable Cluster Shared Volumes (CSVs).BIn Failover Cluster Manager, edit the properties of a single VM.CIn Virtual Network Manager, edit the properties of the virtual network.DIn Hyper-V Manager, take each VM offline and edit the settings of each VM.

单选题You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()ATwo network adapters that support 802.1p, and one iSCSI host bus adapterBTwo network adapters that support 802.1p, and one network adapter that supports TCP ChimneyCTwo network adapters that support 802.lq, and one network adapter that supports Jumbo framesDThree network adapters that support 802. 1p

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?()AIncorrect subnet maskBMismatched MTUCSwitching loopDVLAN mismatch

多选题Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade.  Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network.  Which two sets of actions should your plan include?()APause the three VMs, and copy the .vhd files to the test environmentBCreate a checkpoint of the three VMs, and export the checkpoint to the test environmentCImport the checkpoint into the test environment, and apply the application update for testingDCreate three VMs in the test environment, attach the existing .vhd files, and apply the application update for testing

单选题Your web page includes a Java SE v1.5 applet with the following declaration: 11. 13. 14. Which HTTP method is used to retrieve the applet code?()AGETBPUTCPOSTDRETRIEVE

单选题Your network environment includes two Windows Server 2008 R2 Hyper-V servers and one VMware ESX 3.5 host server. You are designing a Microsoft System Center Virtual Machine Manager (SCVMM) 2008 R2 implementation to manage your network environment. SCVMM must be able to perform management tasks that require file transfer operations between your VMware server and your Windows servers. You need to configure the ESX host server to ensure that file transfer operations are encrypted, and follow security best practices. What should you do?()AUse the default root credentials as the virtual machine delegate, and enable SSH root loginBCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and enable SSH root loginCCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and disable SSH root loginDUse the default root credentials as the virtual machine delegate, and disable SSH root login

多选题You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()Aa port numberBan encryption keyCthe VMM server nameDthe URL of the VMM Self-Service Portal

单选题Which one is the most important based on the following common elements of a network design?()ABusiness needsBRisk analysisCSecurity policyDBest practices

多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment

多选题Which three of the following are elements of the Cisco Unified Wireless Network?()AUnified advanced serviceBclient devicesCCatalyst switchesDnetwork managementEmesh access pointsFVPN concentrator