单选题Your virtual environment includes several Windows Server 2008 R2 Hyper-V servers. Some servers have 16 GB of RAM, and some servers have 32 GB of RAM. Each server has a dedicated management network adapter. Several virtual machines (VMs) are configured on local disk arrays. You plan to enable live migration between all Hyper-V host servers. Your plan must optimize the environment for live migration and enable the live migration of all VMs among all servers. You need to specify the components to add or upgrade. What should you do?()AInstall additional RAM as necessary so that all host servers have the same amount of RAM. Add a second network adapter to each host server, and assign this network adapter to a local switchBOn each Hyper-V host server, provision additional disk resources on the local storage volumes. Install additional RAM as necessary so that all host servers have the same amount of RAMCOn each Hyper-V host server, provision additional disk resources on the local storage volumes. Add a second network adapter to each host server, and assign this network adapter to a local switchDOn each Hyper-V host server, provision additional disk resources on shared storage volumes. Add a second network adapter to each host server, and assign this network adapter to a local switch

单选题
Your virtual environment includes several Windows Server 2008 R2 Hyper-V servers. Some servers have 16 GB of RAM, and some servers have 32 GB of RAM. Each server has a dedicated management network adapter. Several virtual machines (VMs) are configured on local disk arrays. You plan to enable live migration between all Hyper-V host servers. Your plan must optimize the environment for live migration and enable the live migration of all VMs among all servers. You need to specify the components to add or upgrade. What should you do?()
A

Install additional RAM as necessary so that all host servers have the same amount of RAM. Add a second network adapter to each host server, and assign this network adapter to a local switch

B

On each Hyper-V host server, provision additional disk resources on the local storage volumes. Install additional RAM as necessary so that all host servers have the same amount of RAM

C

On each Hyper-V host server, provision additional disk resources on the local storage volumes. Add a second network adapter to each host server, and assign this network adapter to a local switch

D

On each Hyper-V host server, provision additional disk resources on shared storage volumes. Add a second network adapter to each host server, and assign this network adapter to a local switch


参考解析

解析: 暂无解析

相关考题:

Your environment includes Hyper-V and VMware ESX. You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to perform a virtual-tovirtual (V2V) conversion of a virtual machine (VM) that is located on the ESX server. You start the conversion by using the Convert Virtual Machine Wizard. Communication between the destination host and the ESX server fails, and the conversion does not finish successfully. You need to ensure that the conversion finishes successfully.  What should you change?()A、WSMan permissions and settingsB、Server Message Block (SMB) settingsC、Secure Shell (SSH) and HTTPS settingsD、Windows Firewall exceptions for Background Intelligent Transfer Service (BITS)

Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()A、Enable Cluster Shared Volumes (CSVs).B、In Failover Cluster Manager, edit the properties of a single VM.C、In Virtual Network Manager, edit the properties of the virtual network.D、In Hyper-V Manager, take each VM offline and edit the settings of each VM.

.Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You are deploying a  Remote Desktop Pool.You need to choose an operating system for the virtual machines(VMs)in the pool. Which two operating systems will achieve this goal?()A、Windows Vista EnterpriseB、Windows 7 EnterpriseC、Windows Server 2008D、Windows Server 2008 R2

Your virtual environment includes Microsoft Virtual Server 2005 R2 and third-party hypervisors. The virtual machines (VMs) include messaging, application, and database servers. You intend to standardize on Windows Server 2008 R2 Hyper-V servers.  You are developing a migration plan by using the Microsoft Assessment and Planning (MAP) Toolkit. You need to gather the necessary information to analyze the current virtual environment.  Which MAP assessment should you choose?()A、Application Virtualization AssessmentB、Virtual Machine InventoryC、Windows Server 2008 R2 ReadinessD、Windows Server Role Discovery

You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to perform  physical-to-virtual (P2V) conversion s . Your companys network includes computers that each run one of the following operating systems : Windows NT 4.0 Server with SP6a Windows 2000 Server with SP4 Windows Server 2003 with SP2 Windows Web Server 2008 R2 You need to choose the operating  systems that can be converted by using the online P2V method. Which two operating systems should you choose?() A、Windows NT 4.0 Server with SP6aB、Windows 2000 Server with SP4C、Windows Server 2003 with SP2D、Windows Web Server 2008 R2

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade. Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network. Which two sets of actions should your plan include?()A、Import the checkpoint into the test environment, and apply the application update for testingB、Create a checkpoint of the three VMs, and export the checkpoint to the test environmentC、Create three VMs in the test environment, attach the existing .vhd files, and apply the application update for testingD、Pause the three VMs, and copy the .vhd files to the test environment

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You update the MED-V Workspace virtual machines (VMs) several times and notice that the server is running out of disk space. You need to configure the Workspace to minimize the disk space requirements. What should you do?()A、Configure the Workspace as revertible.B、Set an expiration date for the Workspace.C、Specify the number of image versions to keep.D、Specify that clients should use Trim Transfer when downloading images.

Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to place multiple Hyper-V servers in the perimeter network (also known as DMZ). You need to be able to manage the Hyper-V servers by using VMM.  Which two actions should you perform for each server in the perimeter network?()A、Create a local administrative accountB、Perform a VMM local agent installationC、Open port 8100 in the Windows firewallD、Copy the security file to the VMM Administrator Console, and then run the Add Hosts Wizard

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()A、Use the Remote Desktop Connection Broker and failover clusteringB、Use the Remote Desktop Gateway and network load balancingC、Use network load balancing and failover clusteringD、Use DNS round-robin and network load balancing

Your network environment includes the following elements: Two Windows Server 2008 R2 Hyper-V serversTwo VMware ESX 3.5 serversMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2   You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion.  What should you do?()A、Run the New-V2V PowerShell cmdletB、Perform a physical-to-virtual (P2V) conversion while the VMs are runningC、Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionD、Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion

Your company has 1,000 client computers that run Windows 7.   The company uses several custom line-of-business applications that are not compatible with Windows 7.    You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) v2 virtual machine (VM) image that includes the custom applications to all Windows 7 client computers.   What should you do?()A、Deploy the VM image from the MED-V server.B、Mount the VM image from the MED-V workspace.C、Deploy the VM image by using Windows Deployment Services (WDS).D、Deploy the VM image by using Windows Server Update Services (WSUS).

Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Monitoring. You are configuring a Windows Server 2008 R2 Hyper-V server that hosts several virtual machines (VMs). You need to ensure that members of the Monitoring group can only stop and start VMs on the host server. What should you do?()A、Add the Monitoring group to the Server Operators AD security group.B、In Authorization Manager, add the Monitoring group to the Administrator role in the default scope.C、In Authorization Manager, create a task that includes the Stop Virtual Machine and Start Virtual Machine operations. Add the task to the Administrator role.D、In Authorization Manager, create a role in the default scope. Add the Stop Virtual Machine and Start Virtual Machine operations to the role. Assign the Monitoring group to the role.

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

单选题Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()AEnable Cluster Shared Volumes (CSVs).BIn Failover Cluster Manager, edit the properties of a single VM.CIn Virtual Network Manager, edit the properties of the virtual network.DIn Hyper-V Manager, take each VM offline and edit the settings of each VM.

单选题Your environment includes Hyper-V and VMware ESX. You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to perform a virtual-tovirtual (V2V) conversion of a virtual machine (VM) that is located on the ESX server. You start the conversion by using the Convert Virtual Machine Wizard. Communication between the destination host and the ESX server fails, and the conversion does not finish successfully. You need to ensure that the conversion finishes successfully.  What should you change?()AWSMan permissions and settingsBServer Message Block (SMB) settingsCSecure Shell (SSH) and HTTPS settingsDWindows Firewall exceptions for Background Intelligent Transfer Service (BITS)

单选题A company has several legacy servers that upper management would like to move into a virtual environment. Which of the following is the FIRST step an administrator should take to evaluating whether the servers can be moved into the virtual environment?()A Compare the costs of maintenance between the physical and virtual servers.B Run SYSPREP on each legacy server.C Check the HCL on each legacy server.D Verify that all the latest OS service packs are installed on each server.

多选题Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You are deploying a  Remote Desktop Pool.You need to choose an operating system for the virtual machines(VMs)in the pool. Which two operating systems will achieve this goal?()AWindows Vista EnterpriseBWindows 7 EnterpriseCWindows Server 2008DWindows Server 2008 R2

单选题Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()AShut down the VMs, and then perform a physical-to-virtual (P2V) conversionBShut down the VMs, and then perform a virtual-to-virtual (V2V) conversionCPerform a physical-to-virtual (P2V) conversion while the VMs are runningDPerform a physical-to-virtual (P2V) conversion while the VMs are shutdown

多选题Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade.  Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network.  Which two sets of actions should your plan include?()APause the three VMs, and copy the .vhd files to the test environmentBCreate a checkpoint of the three VMs, and export the checkpoint to the test environmentCImport the checkpoint into the test environment, and apply the application update for testingDCreate three VMs in the test environment, attach the existing .vhd files, and apply the application update for testing

多选题Your environment includes a Windows Server 2008 R2 Hyper-V failover cluster and a single Windows Server 2008 R2 Hyper-V server. You are designing a migration strategy.  You need to ensure that you can perform a SAN migration to move virtual machines (VMs) from the single server into the failover cluster.  Which two actions should you perform?()AAdd the Storage Manager for SANs featureBInstall a Virtual Disk Service (VDS) hardware providerCUse Cluster Shared Volumes (CSVs) to store the VM filesDInstall Microsoft System Center Virtual Machine Manager (VMM) 2008 R2

单选题Your network environment includes two Windows Server 2008 R2 Hyper-V servers and one VMware ESX 3.5 host server. You are designing a Microsoft System Center Virtual Machine Manager (SCVMM) 2008 R2 implementation to manage your network environment. SCVMM must be able to perform management tasks that require file transfer operations between your VMware server and your Windows servers. You need to configure the ESX host server to ensure that file transfer operations are encrypted, and follow security best practices. What should you do?()AUse the default root credentials as the virtual machine delegate, and enable SSH root loginBCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and enable SSH root loginCCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and disable SSH root loginDUse the default root credentials as the virtual machine delegate, and disable SSH root login

多选题Your environment includes a Windows Server 2008 R2 Hyper-V failover cluster and a single Windows Server 2008 R2 Hyper-V server. You are designing a migration strategy. You need to ensure that you can perform a SAN migration to move virtual machines (VMs) from the single server into the failover cluster. Which two actions should you perform?()AInstall Microsoft System Center Virtual Machine Manager (VMM) 2008 R2BInstall a Virtual Disk Service (VDS) hardware providerCUse Cluster Shared Volumes (CSVs) to store the VM filesDAdd the Storage Manager for SANs feature

单选题Your virtual environment includes Microsoft Virtual Server 2005 R2 and third-party hypervisors. The virtual machines (VMs) include messaging, application, and database servers. You intend to standardize on Windows Server 2008 R2 Hyper-V servers. You are developing a migration plan by using the Microsoft Assessment and Planning (MAP) Toolkit. You need to gather the necessary information to analyze the current virtual environment. Which MAP assessment should you choose?()AWindows Server Role DiscoveryBApplication Virtualization AssessmentCVirtual Machine InventoryDWindows Server 2008 R2 Readiness