You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()A、Two network cards that support network adapter teamingB、A network card that supports Virtual Machine ChimneyC、An additional Hyper-V host and Network Load Balancing (NLB)D、An additional Hyper-V host and Failover Clustering

You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()

  • A、Two network cards that support network adapter teaming
  • B、A network card that supports Virtual Machine Chimney
  • C、An additional Hyper-V host and Network Load Balancing (NLB)
  • D、An additional Hyper-V host and Failover Clustering

相关考题:

You are evaluating the use of pass-through disks for the database servers. You need to recommend a backup solution for the database servers that meets the following requirements: - Minimizes costs. - Provides for the recovery of the databases if a hardware failure occurs. What should you include in the recommendation?()A、Create full backups of the Hyper-V host by using Windows Server BackupB、Create snapshots of the VMs from Hyper-V ManagerC、Create full backups of the Hyper-V host by using Microsoft System Center Data Protection ManagerD、Create full backups of the VMs by using Windows Server Backup from within the VMs

You plan to implement a Hyper-V host cluster. The cluster will contain two servers connected to a Storage Area Network (SAN). You need to recommend a storage location for virtual machine (VM) snapshots. The solution must ensure that the VMs can fail over. Which storage location should you recommend?()A、a domain-based Distributed File System (DFS) namespaceB、a network shareC、the SAND、a local hard disk

You are migrating a solution to Windows Azure.   The solution includes a web application and a business logic layer.  The web application runs on three dual-core servers.  The business logic layer runs on two quad-core servers.   The Windows Azure application must match or exceed the current hardware specifications.  You need to recommend role instance sizes that minimize cost.  What should you recommend?()A、 Small for the web application and Medium for the business logic layerB、 Small for the web application and Large for the business logic layerC、 Medium for the web application and Large for the business logic layerD、 Large for the web application and Extra Large for the business logic layer

Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?() A、FTPB、XCOPYC、the Publish Web toolD、the Copy Web tool

You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()A、two child partitions with VHDs stored on an iSCSI SANB、two child partitions with volumes mounted from an iSCSI SANC、two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)D、two host servers with Fibre ChannelCattached storage enabled for Cluster Shared Volumes (CSVs)

You need to recommend a technology for the VDI deployment to maximize the number of VMs that can run concurrently on a single Hyper-V host. What should you include in the recommendation?()A、RemoteFXB、Dynamic MemoryC、CPU Core ParkingD、Fair Share CPU Scheduling

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()A、Configure a failover cluster.B、Configure a Web garden on each Web server.C、Create a Network Load Balancing cluster.D、Create two application pools on each Web server.

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()A、Disable File and Printer Sharing on the servers.B、Disable the IIS Admin service on the servers.C、Enable Server Message Block (SMB) signing on the servers.D、Assign the Secure Server (Require Security) IPSec policy to the servers.

You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. The Remote Desktop Services (RDS) environment includes a Remote Desktop Session Host (RD Session Host) server in the LAN environment, and a Remote Desktop Gateway (RD Gateway) server in the perimeter network. You deploy a Remote Desktop Web Access (RD Web Access) server in the perimeter network. You publish a RemoteApp application. The RemoteApp application is not visible to users when they log in to RD Web Access.You need to ensure that authorized users can run RemoteApp applications from RD Web Access. What should you do?()A、Restart the World Wide Web Publishing Service on the RD Web Access server.B、Disab le Forms Authentication on the Default Web Site on the RD Web Access server.C、Allow Windows Management Instrumentation (WMI) communication between the RD Gateway server and the RD Session Host server.D、Allow Windows Management Instrumentation (WMI) commu nication between the RD Web Access server and the RD Session Host server.

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

You plan to deploy a RemoteApp solution. You plan to install the Remote Desktop Session Host (RD Session Host) role service on a server named Server1 You need to recommend a solution that prevents a single connection to Server1 from using more than 10 percent of the available CPU resources on the server. What should you include in the recommendation?()A、Windows System Resource Manager (WSRM)B、Microsoft System Center Operations ManagerC、Microsoft System Center Virtual Machine ManagerD、Microsoft Application Virtualization (App-V)

You deploy a Windows Server 2008 R2 Hyper-V server with one virtual machine (VM). The host  servers CPU resources are fully utilized by the VM. You need to ensure that the VM does not fully utilize the host servers CPU resources. What should you do?()A、Set the relative weight to 80.B、Set the virtual machine limit to 80.C、Set the virtual machine reserve to 80.D、Set the number of logical processors to 2.

An administrator named Admin1 plans to implement the planned VDI solution. You need to recommend a technology for the VDI deployment that maximizes the number of VMs that can run concurrently on a single Hyper-V host. What should you include in the recommendation?()A、RemoteFXB、Dynamic MemoryC、CPU Core ParkingD、Fair Share CPU Scheduling

Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster.  Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster.  How many servers should you recommend?()A、threeB、fourC、fiveD、six

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS). You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that programs that are running continue to run when users are no longer actively connected to the RD Session Host server. Which setting should you configure?()A、Idle session limitB、Active session limitC、End a disconnected sessionD、When a session limit is reached or connection is broken

单选题You are evaluating the use of pass-through disks for the Exchange servers. You need to recommend a backup solution for the Exchange servers that meets the following requirements: - Minimizes costs. - Provides for the recovery of the Exchange databases if a hardware failure occurs. What should you include in the recommendation?()ACreate snapshots of the VMs from Hyper-V ManagerBCreate full backups of the Hyper-V host by using Windows Server BackupCCreate full backups of the VMs by using Windows Server Backup from within the VMsDCreate full backups of the Hyper-V host by using Microsoft System Center Data Protection manager

单选题You need to recommend a technology for the VDI deployment to maximize the number of VMs that can run concurrently on a single Hyper-V host. What should you include in the recommendation?()ARemoteFXBDynamic MemoryCCPU Core ParkingDFair Share CPU Scheduling

单选题All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS). You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that programs that are running continue to run when users are no longer actively connected to the RD Session Host server. Which setting should you configure?()AIdle session limitBActive session limitCEnd a disconnected sessionDWhen a session limit is reached or connection is broken

单选题An administrator named Admin1 plans to implement the planned VDI solution. You need to recommend a technology for the VDI deployment that maximizes the number of VMs that can run concurrently on a single Hyper-V host. What should you include in the recommendation?()ARemoteFXBDynamic MemoryCCPU Core ParkingDFair Share CPU Scheduling

单选题You are migrating a solution to Windows Azure.   The solution includes a web application and a business logic layer.  The web application runs on three dual-core servers.  The business logic layer runs on two quad-core servers.   The Windows Azure application must match or exceed the current hardware specifications.  You need to recommend role instance sizes that minimize cost.  What should you recommend?()A Small for the web application and Medium for the business logic layerB Small for the web application and Large for the business logic layerC Medium for the web application and Large for the business logic layerD Large for the web application and Extra Large for the business logic layer