An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()A、Humongous2B、Humongous4C、Humongous3D、Humongous1

An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()

  • A、Humongous2
  • B、Humongous4
  • C、Humongous3
  • D、Humongous1

相关考题:

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()A. Performance consoleB. System MonitorC. Network MonitorD. Task Manager

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.All servers run Windows Server 2008 R2.The organization contains Mailbox servers, Client Access servers, and Hub Transport servers only. You need to ensure that you can review any changes made by administrators to the Exchange configuration.The solution must identify which administrator performed each change. What should you do?()A、Run the Get-MailboxStatistics cmdlet.B、Enable SMTP protocol logging.C、Run the Exchange Server User Monitor (ExMon).D、Modify the Log Settings from the properties of the Hub Transport server.E、Run the Set-AdminAuditLogConfig cmdlet.F、Review the Application event log.

Your virtual environment includes Microsoft Virtual Server 2005 R2 and third-party hypervisors. The virtual machines (VMs) include messaging, application, and database servers. You intend to standardize on Windows Server 2008 R2 Hyper-V servers.  You are developing a migration plan by using the Microsoft Assessment and Planning (MAP) Toolkit. You need to gather the necessary information to analyze the current virtual environment.  Which MAP assessment should you choose?()A、Application Virtualization AssessmentB、Virtual Machine InventoryC、Windows Server 2008 R2 ReadinessD、Windows Server Role Discovery

You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to perform  physical-to-virtual (P2V) conversion s . Your companys network includes computers that each run one of the following operating systems : Windows NT 4.0 Server with SP6a Windows 2000 Server with SP4 Windows Server 2003 with SP2 Windows Web Server 2008 R2 You need to choose the operating  systems that can be converted by using the online P2V method. Which two operating systems should you choose?() A、Windows NT 4.0 Server with SP6aB、Windows 2000 Server with SP4C、Windows Server 2003 with SP2D、Windows Web Server 2008 R2

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

You plan to deploy three Hyper-V servers named Server1 Server2, and Server3. Server1 will host three virtual machines (VMs), Server2 will host two VMs, and Server3 will host five VMs. All of the VMs will run Windows Server 2008 R2 Standard. You need to identify the minimum number and the type of licenses required for the planned deployment. The solution must minimize software costs. What should you identify?()A、Three Windows Server 2008 R2 Enterprise licenses and one Windows Server 2008 R2 Standard licenseB、Three Windows Server 2008 R2 Enterprise licensesC、Three Windows Server 2008 R2 Standard licensesD、Three Windows Server 2008 R2 Enterprise licenses and 10 Windows Server 2008 R2 Standard licenses

You plan to install Exchange Server 2010 Service Pack 1 (SP1) servers in an existing Exchange Server 2007 organization.All servers will coexist in a single Active Directory site. You need to identify which role must be transitioned to Exchange Server 2010 first. Which role should you identify?()A、Hub Transport.B、Mailbox Server.C、Unfied Messaging.D、Client Access Server.

You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()A、RemoteAppB、Remote AssistanceC、Remote DesktopD、Remote Server Administration Tools (RSAT)

Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs).  You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration.  Which two actions should you include in your design?()A、Enable the automount feature on each node in the clusterB、Install a Virtual Disk Service (VDS) hardware provider on each node in the clusterC、Place all VMs on a single Cluster Shared Volume (CSV)D、Place all VMs on a dedicated logical unit number (LUN)

Your network environment includes the following elements: Two Windows Server 2008 R2 Hyper-V serversTwo VMware ESX 3.5 serversMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2   You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion.  What should you do?()A、Run the New-V2V PowerShell cmdletB、Perform a physical-to-virtual (P2V) conversion while the VMs are runningC、Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionD、Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion

You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center  Virtual Machine Manager (VMM) 2008 R2. Testers are members of an AD security group named Test. You need to ensure that members of the Test group can create VMs on a specific host server by using the VMM Self-Service Portal. What should you do?()A、In VMM, specify a template for new VMs created by members of the Test group.B、In VMM, create a Delegated Administrator user role and add the Test group to this role.C、In VMM, assign the Test group the Local Administrator permission for the specific host server.D、Install Hyper-V Manager on the client computer of each member of the Test group, and grant the Test group administrative privileges on the specific host server.

Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()A、Create a host group. Add the host servers that the user will manage to the host group.B、Create a failover cluster. Join the host servers that the user will manage to the failover cluster.C、Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.D、Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.

You plan to implement Hyper-V Virtualization to test applications. In the test environment, you will take frequent snapshots of virtual machines (VMs). You need to recommend which disk types you should use for the planned deployment of the VMs.   Which disk types should you recommend?()A、fixed-sizeB、dynamically expandingC、pass-throughD、differencing

You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()A、a port numberB、an encryption keyC、the VMM server nameD、the URL of the VMM Self-Service Portal

An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS

An administrator named Admin1 plans to implement the planned VDI solution. You need to recommend a technology for the VDI deployment that maximizes the number of VMs that can run concurrently on a single Hyper-V host. What should you include in the recommendation?()A、RemoteFXB、Dynamic MemoryC、CPU Core ParkingD、Fair Share CPU Scheduling

An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()A、a synthetic network adapterB、an emulated network adapterC、virtual machine queue (VMQ)D、Virtual Machine Chimney

The servers on your network run Windows Server 2008 R2. You are planning a two-node Hyper-V failover cluster with SAN storage, and 16 virtual machines (VMs).  You plan to use quick migration. You need to place the maximum number of VMs on each logical unit number (LUN). You need to ensure that you can move individual VMs between cluster nodes without affecting other VMs.  How many VMs should you place on each LUN?()A、oneB、twoC、fourD、eight

Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()A、Shut down the VMs, and then perform a physical-to-virtual (P2V) conversionB、Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionC、Perform a physical-to-virtual (P2V) conversion while the VMs are runningD、Perform a physical-to-virtual (P2V) conversion while the VMs are shutdown

You are planning the consolidation of the application servers. You need to identify the appropriate disk configuration for the VMs based on the company’s planned changes. Which disk configuration should you identify?()A、fixed-size virtual hard disk (VHD)B、dynamically expanding virtual hard disk (VHD)C、differencing disksD、pass-through disks

You are using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to perform a  physical-to-virtual (P2V) conversion of a Windows Server 2008 R2 server. You need to prepare the server for the P2V conversion. Which two actions should you perform on the server?()A、Run the Chkdsk utility.B、Perform a disk defragmentation.C、Stop the Volume Shadow Copy service.D、Convert the system partition to a dynamic disk.

You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V environment. You start a physical-to-virtual (P2V) conversion by using the Convert Physical Server (P2V) Wizard. The wizard indicates that a driver is missing. You need to ensure that you can complete the P2V conversion. Which two actions should you perform?()A、Add the driver file to the VMM library.B、Add the driver file to the Patch Import directory on the VMM server.C、Run the PowerShell Add-Patch cmdlet.D、Run the PowerShell Get-HotFix cmdlet.

单选题An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()AHumongous2BHumongous4CHumongous3DHumongous1

多选题You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()Aa port numberBan encryption keyCthe VMM server nameDthe URL of the VMM Self-Service Portal

单选题An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()Aa synthetic network adapterBan emulated network adapterCvirtual machine queue (VMQ)DVirtual Machine Chimney

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()AYou should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured BYou should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured CYou should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured DYou should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA