[Free] 2018(June) Dumps4cert Microsoft 70-768 Dumps with VCE and PDF Download 101-110

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Microsoft Official New Released 70-768
100% Free Download! 100% Pass Guaranteed!

Configuring Advanced Windows Server 2012 R2 Services

Question No: 101 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

You add two additional nodes in Cluster1.

You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace.

You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1.

What should you configure?

  1. Affinity-None

  2. Affinity-Single

  3. The cluster quorum settings

  4. The failover settings

  5. A file server for general use

  6. The Handling priority

  7. The host priority

  8. Live migration

  9. The possible owner

  10. The preferred owner

  11. Quick migration

  12. The Scale-Out File Server

    Answer: E Explanation:

    File Server for general use

    Ensurepass 2018 PDF and VCE

    Note: You can deploy and configure a clustered file server by using either of the following methods:

    • File Server for general use.

      This is the continuation of the clustered file server that has been supported in Windows Server since the introduction of Failover Clustering. This type of clustered file server, and therefore all the shares associated with the clustered file server, is online on one node at a time. This is sometimes referred to as active-passive or dual-active. File shares associated with this type of clustered file server are called clustered file shares. This is the recommended file server type when deploying information worker scenarios.

    • Scale-Out File Server for application data

    This clustered file server feature was introduced in Windows Server 2012, and it lets you store server application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are simultaneously online on all nodes. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. This is the recommended file server type when deploying either Hyper-V over Server Message Block (SMB) or Microsoft SQL Server over SMB.

    Reference: Scale-Out File Server for Application Data Overview

    Question No: 102 DRAG DROP – (Topic 2)

    You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the clusters run Windows Server 2012 R2.

    Cluster1 hosts two virtual machines named VM1 and VM2.

    You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3. You need to configure the witness disk for Cluster3 to be hosted on Cluster2.

    Which three actions should you perform in sequence?

    To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Ensurepass 2018 PDF and VCE

    C:\Users\Chaudhry\Desktop\1.jpg

    Explanation/Reference: Note:

    • Use the Create Clustered File Server Wizard

      When you create a Scale-Out File Server Cluster from existing servers, the Create Clustered File Server

      Wizard does the following:

      1. Enables the file server role on the computers (box 1)

      2. Enables the Scale-Out File Server role on the cluster (box 2)

      3. Adds the provisioned computers as a Scale-Out File Server cluster under VMM management

    • VMM provides support for the Microsoft iSCSI Software Target by using an SMI-S provider. Microsoft iSCSI is now fully integrated into Windows Server 2012.

    • Scale-Out File Server- As of System Center 2012 R2, VMM can create a Scale-Out File Server and manage its storage.

      Question No: 103 – (Topic 2)

      Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2.

      You are configuring a central access policy for temporary employees.

      You enable the Department resource property and assign the property a suggested value of Temp.

      You need to configure a target resource condition for the central access rule that is scoped to resources assigned to Temp only.

      Which condition should you use?

        1. (Temp.Resource Equals quot;Departmentquot;)

        2. (Resource.Temp Equals quot;Departmentquot;)

        3. (Resource.Department Equals quot;Tempquot;)

        4. (Department.Value Equals quot;Tempquot;)

Answer: C Explanation:

Example:

Targeting: Resource.Department Contains Finance

Access rule: Allow read User.Country=Resource.Country AND User.department = Resource.Department

Reference: Deploy a Central Access Policy (Demonstration Steps)

Question No: 104 HOTSPOT – (Topic 2)

Your company has a main office and a branch office. An Active Directory site exists for each office.

The network contains an Active Directory forest named contoso.com. The contoso.com domain contains three member servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2.

In the main office, you configure Server1 as a file server that uses BranchCache.

In the branch office, you configure Server2 and Server3 as BranchCache hosted cache servers.

You are creating a Group Policy for the branch office site. Which two Group Policy settings should you configure?

To answer, select the appropriate two settings in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

To use Group Policy to configure clients for hosted cache mode

Step x: In the Turn on BranchCache dialog box, click Enabled, and then click OK.

Step x 1: In the Group Policy Management Editor console, ensure that BranchCache is still selected, and then in the details pane double-click Set BranchCache Hosted Cache mode. The Set BranchCache Hosted Cache mode dialog box opens.

Question No: 105 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed.

Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machines run on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed. The Hyper-V Replica Broker currently runs on Server1.

Server3 currently has no virtual machines.

You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server for Cluster1.

Which two tools should you use? (Each correct answer presents part of the solution. Choose two.)

  1. The Hyper-V Manager console connected to Server3

  2. The Failover Cluster Manager console connected to Server3

  3. The Hyper-V Manager console connected to Server1.

  4. The Failover Cluster Manager console connected to Cluster1

  5. The Hyper-V Manager console connected to Server2

Answer: A,D Explanation:

A. To configure the Replica server [on a server that is not part of a cluster which in this case is Server3]

->In Hyper-V Manager, clickHyper-V Settingsin theActionspane.

->In theHyper-V Settingsdialog, clickReplication Configuration.

->In the Details pane, selectEnable this computer as a Replica server.

Etc.

  1. To configure a Replica server that is part of a failover cluster.

    1. In Server Manager, open Failover Cluster Manager.

    2. In the left pane, connect to the cluster, and while the cluster name is highlighted, click Roles in the Navigate category of the Details pane.

    3. Right-click the role and choose Replication Settings.

    4. In the Details pane, select Enable this cluster as a Replica server. Etc.

      Reference: Deploy Hyper-V Replica , Step 2: Enable Replication http://technet.microsoft.com/en-us/library/jj134240.aspx

      Question No: 106 – (Topic 2)

      Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a file server that has the Hyper-V server role installed.

      Server1 hosts several virtual machines. The virtual machine configuration files are stored on drive D and the VHD files are stored on drive E.

      You plan to replace drive E with a larger volume.

      You need to ensure that the virtual machines on Server1 remain available while drive E is being replaced.

      What should you do?

      1. Perform a quick migration.

      2. Add Server1 and Server2 as nodes in a failover cluster.

      3. Perform a live migration.

      4. Perform a storage migration.

Answer: D Explanation:

Hyper-V in Windows Server 2012 R2 introduces support for moving virtual machine storage without downtime by making it possible to move the storage while the virtual machine remains running.

Reference: Virtual Machine Storage Migration Overview http://technet.microsoft.com/en-us/library/hh831656.aspx

Question No: 107 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

Cluster1 hosts an Application named App1.

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.

What should you configure?

  1. Affinity-None

  2. Affinity-Single

  3. The cluster quorum settings

  4. The failover settings

  5. A file server for general use

  6. The Handling priority

  7. The host priority

  8. Live migration

  9. The possible owner

  10. The preferred owner

  11. Quick migration

  12. the Scale-Out File Server

Answer: J Explanation:

The preferred owner in a two-server cluster will always be the active node unless it is down.

Reference: Preferred Owners in a Cluster http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx

Question No: 108 – (Topic 2)

Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two Active Directory sites named Site1 and Site2. The first domain controller in the forest runs Windows Server 2012 R2.

You need to force the replication of the SYSVOL folder from Site1 to Site2. Which tool should you use?

  1. Active Directory Sites and Services

  2. DFS Management

  3. Repadmin

  4. Dfsrdiag

Answer: D Explanation:

In Windows Server 2012 R2, Windows Server 2008 R2, or Windows Server 2008, you can force replication immediately by using DFS Management, as described in Edit Replication Schedules. You can also force replication by using the Dfsrdiag SyncNow command. You can force polling by using the Dfsrdiag PollAD command.

Reference: DFS Replication: Frequently Asked Questions (FAQ) http://technet.microsoft.com/en-us/library/cc773238(v=ws.10).aspx#BKMK_072

Question No: 109 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1.

Port rules are configured for all clustered Applications.

You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule.

What should you configure?

  1. Affinity-None

  2. Affinity-Single

  3. The cluster quorum settings

  4. The failover settings

  5. A file server for general use

  6. The Handling priority

  7. The host priority

  8. Live migration

  9. The possible owner

  10. The preferred owner

  11. Quick migration

  12. The Scale-Out File Server

Answer: G Explanation:

Host Priorities

Each cluster host is assigned a unique host priority in the range of 1 to 32, where lower numbers denote higher priorities. The host with the highest host priority (lowest numeric value) is called thedefault host. It handles all client traffic for the virtual IP addresses that is not specifically intended to be load-balanced. This ensures that server applications not configured for load balancing only receive client traffic on a single host. If the default host fails, the host with the next highest priority takes over as default host.

Reference: Network Load Balancing Technical Overview http://technet.microsoft.com/en-us/library/bb742455.aspx

Question No: 110 HOTSPOT – (Topic 2)

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

The network has the physical sites and TCP/IP subnets configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You have a web application named App1 that is hosted on six separate Web servers. DNS has the host names and IP addresses registered as shown in the following table.

Ensurepass 2018 PDF and VCE

You discover that when users connect to appl.contoso.com, they are connected frequently to a server that is not on their local subnet.

You need to ensure that when the users connect to appl.contoso.com, they connect to a server on their local subnet. The connections must be distributed across the servers that host appl.contoso.com on their subnet.

Which two settings should you configure?

To answer, select the appropriate two settings in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

DNS Round Robin is a mechanism for choosing an IP address from the list returned by a DNS server so that all clients won#39;t get the same IP address every time. Netmask ordering is a mechanism for further optimizing which IP address is used by attempting to determine the closest result.

100% Dumps4cert Free Download!
Download Free Demo:70-768 Demo PDF
100% Dumps4cert Pass Guaranteed!
70-768 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.