Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()A、Use the Remote Desktop Connection Broker and failover clusteringB、Use the Remote Desktop Gateway and network load balancingC、Use network load balancing and failover clusteringD、Use DNS round-robin and network load balancing

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()

  • A、Use the Remote Desktop Connection Broker and failover clustering
  • B、Use the Remote Desktop Gateway and network load balancing
  • C、Use network load balancing and failover clustering
  • D、Use DNS round-robin and network load balancing

相关考题:

Transaction changed to your telephone bill are called () A、virtual pin paymentsB、Internet-bill paymentsC、credit card paymentsD、E-charge payments

Your ERX router is supporting 100 virtual routers.A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?() A.0B.1C.5D.100

Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.What should you do?() A.AB.BC.CD.D

Rate your level of proficiency with managing a virtual desktop infrastructure (VDI) environment, including configuring user state virtualization, and managing virtual desktops remotely.() A.Very HighB.HighC.ModerateD.LowE.Very Low

Rate your level of proficiency with deploying and managing an enterprise desktop virtualization environment, including installing and configuring Windows Virtual PC, enabling and managing Windows XP Mode, creating a MED-V infrastructure, administering a MED-V environment, and deploying virtual desktop images.()A.Very HighB.HighC.ModerateD.LowE.VeryLow

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

在Curver Editor中,可以添加动画声音的选项应为()。A、Environm entB、RendererC、Video PostD、Ripple

Your ERX router is supporting 100 virtual routers. A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?()A、0B、1C、5D、100

Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V. VS1 hosts10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server shutsdown. What should you do?()A、Create a shutdown script on each virtual machine.B、Install Integration Services on each virtual machine.C、Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtualmachine.D、Enable the Shut down the guest operating system option in the Automatic stop action properties oneach virtual machine.

Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 has a virtual switch named Switch1. You replace all of the network adapters on Hyperv1 with new network adapters that support singleroot I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Hyperv1. Which two actions should you perform?()A、On each virtual machine, modify the Advanced Features settings of the network adapterB、Modify the settings of the Switch1 virtual switchC、Delete, and then recreate the Switch1 virtual switchD、On each virtual machine, modify the BIOS settingsE、On each virtual machine, modify the Hardware Acceleration settings of the network adapter

Rate your level of proficiency with managing a virtual desktop infrastructure (VDI) environment, including configuring user state virtualization, and managing virtual desktops remotely.()A、Very HighB、HighC、ModerateD、LowE、Very Low

Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs).  You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration.  Which two actions should you include in your design?()A、Enable the automount feature on each node in the clusterB、Install a Virtual Disk Service (VDS) hardware provider on each node in the clusterC、Place all VMs on a single Cluster Shared Volume (CSV)D、Place all VMs on a dedicated logical unit number (LUN)

Your network environment includes the following elements: Two Windows Server 2008 R2 Hyper-V serversTwo VMware ESX 3.5 serversMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2   You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion.  What should you do?()A、Run the New-V2V PowerShell cmdletB、Perform a physical-to-virtual (P2V) conversion while the VMs are runningC、Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionD、Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion

Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You need to create a single distribution file containing Windows Virtual PC and a virtual machine image that will be deployed to all client computers. Which should you use?()A、Microsoft System Center Virtual Machine Manager ( VMM) 2008 with a templateB、Deployment Image Servicing and Management (DISM)C、Microsoft Enterprise Desktop Virtualization (MED - V) Packaging WizardD、Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template

Rate your level of proficiency with deploying and managing an enterprise desktop virtualization environment, including installing and configuring Windows Virtual PC, enabling and managing Windows XP Mode, creating a MED-V infrastructure, administering a MED-V environment, and deploying virtual desktop images.()A、Very HighB、HighC、ModerateD、LowE、VeryLow

单选题Your ERX router is supporting 100 virtual routers.A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?()A0B1C5D100

单选题Your environment includes Hyper-V and VMware ESX. You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to perform a virtual-tovirtual (V2V) conversion of a virtual machine (VM) that is located on the ESX server. You start the conversion by using the Convert Virtual Machine Wizard. Communication between the destination host and the ESX server fails, and the conversion does not finish successfully. You need to ensure that the conversion finishes successfully.  What should you change?()AWSMan permissions and settingsBServer Message Block (SMB) settingsCSecure Shell (SSH) and HTTPS settingsDWindows Firewall exceptions for Background Intelligent Transfer Service (BITS)

单选题Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V. VS1 hosts 10 virtual machines.  You need to configure VS1 to shut down each virtual machine before the server shuts down. What should you do?()ACreate a shutdown script on each virtual machine.BInstall Integration Services on each virtual machine.CEnable the Turn off the virtual machine option in the Automatic stop action properties on each virtual machine.DEnable the Shut down the guest operating system option in the Automatic stop action properties on each virtual machine.

多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

单选题Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You create a Windows XP image. You need to deploy the image as a virtual machine (VM) to the client computers so that the image can run in Windows Virtual PC. Which should you use? ()AMicrosoft System Center Virtual Machine Manager (VMM) 2008 with a templateBMicrosoft Virtual Desktop Infrastructure (VDI)CMicrosoft System Center Configuration Manager 2007 R2DMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template

单选题Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()AShut down the VMs, and then perform a physical-to-virtual (P2V) conversionBShut down the VMs, and then perform a virtual-to-virtual (V2V) conversionCPerform a physical-to-virtual (P2V) conversion while the VMs are runningDPerform a physical-to-virtual (P2V) conversion while the VMs are shutdown

单选题Rate your level of proficiency with managing a virtual desktop infrastructure (VDI) environment, including configuring user state virtualization, and managing virtual desktops remotely.()AVery HighBHighCModerateDLowEVery Low

单选题Your network environment includes two Windows Server 2008 R2 Hyper-V servers and one VMware ESX 3.5 host server. You are designing a Microsoft System Center Virtual Machine Manager (SCVMM) 2008 R2 implementation to manage your network environment. SCVMM must be able to perform management tasks that require file transfer operations between your VMware server and your Windows servers. You need to configure the ESX host server to ensure that file transfer operations are encrypted, and follow security best practices. What should you do?()AUse the default root credentials as the virtual machine delegate, and enable SSH root loginBCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and enable SSH root loginCCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and disable SSH root loginDUse the default root credentials as the virtual machine delegate, and disable SSH root login

单选题You manage your Hyper-V environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to perform a virtual-to-virtual (V2V) conversion of existing VMware virtual  machines (VMs). You need to choose a type of virtual disk that is supported by VMM. Which type should you choose?()AvmfsBvmfs rawCvmfs Raw Device MapDvmfs Pass through Raw Device Map

单选题Rate your level of proficiency with deploying and managing an enterprise desktop virtualization environment, including installing and configuring Windows Virtual PC, enabling a nd managing Windows XP Mode, creating a MED -V infrastructure, administering a MED- V environment, and deploying virtual desktop images.()AVery HighBHighCModerateDLowEVeryLow