2019 Free Microsoft EnsurePass 70-740 Dumps VCE and PDF Download Part 10

EnsurePass
Dumps

70-740 Dumps VCE and PDF

http://www.ensurepass.com/70-740.html

 

QUESTION 81

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, white others might not have a correct solution.

 

Your network contains an Active Directory forest.

 

You install Windows Server 2016 on 10 virtual machines.

 

You need to deploy the Web Server (IIS) server role identically to the virtual machines.

Solution: You use Windows PowefShell Desired State Configuration (DSC) to create a default configuration and then you apply the configuration the virtual,

 

A.

Yes

B.

No

 

Correct Answer: A

Explanation:
https://www.simple-talk.com/sysadmin/powershell/powershell-desired-state-configuration-the-basics/

 

 

QUESTION 82

You have a server named Server1 that runs Windows Server 2016.

 

The Windows Server 2016 installation media is mounted as drive D.

 

You copy the NanoServerImageGenerator folder from the D:\NanoServer folder to the C:\NanoServer folder.

 

You need to create a custom Nano Server image that includes the Hyper-V server role. The image will be used to deploy Nano Servers to physical servers.

 

Which two commands should you run? Each correct answer presents part of the solution.

 

A.

New-NanoServerImage -Edition Standard -DeploymentType Guest -MediaPath D:\ – TargetPath .\NanoServerImage\NanoServer.wim -Compute

B.

Install-PackageProvider NanoServerPackage

C.

Import-PackageProvider NanoServerPackage

D.

New-NanoServerImage -Edition Standard -DeploymentType Host -MediaPath D:\ – TargetPath .\NanoServerImage\NanoServer.wim -Compute

E.

Import-Module C:\NanoServer\NanoServerImageGenerator

 

Correct Answer: DE

 

QUESTION 83

Note: This question is part of a series of questions that use the same similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

 

You have three servers named Server1, Server2. Server3 that run Windows Server 2016 Server1 and Server2 have the Hyper-V server role installed Server3 has the iSCSI Target Server role service installed.

 


 

You need to create a Hyper-V cluster.

Which tool should you use first?

 

A.

the clussvc.exe command

B.

the cluster.exe command

C.

the Computer Management console

D.

the configurehyperv.exe command

E.

the Disk Management console

F.

the Failover Cluster Manager console

G.

the Hyper-V Manager console

H.

the Server Manager Desktop app

 

Correct Answer: H

 

 

QUESTION 84

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

 

After you answer a question in this section, yon will NOT be able to return to it. As a result, these questions will not appear in the review screen.

 

You have two servers that run Windows Server 2016.

 

You plan to create a Network Load Balancing (NLB) cluster that will contain both servers.

 

You need to configure the network cards on the servers for the planned NLB configuration.

 

Solution: You configure the network cards to be on the same subnet and to have static IP addresses. You configure the cluster to use unicast.

 

Does this meet the goal?

 

A.

Yes

B.

No

 

Correct Answer: A

Explanation:
https://technet.microsoft.com/en-us/windows-server-docs/networking/technologies/network-load-balancing

 

 

QUESTION 85

HOTSPOT

You have a server named Served that runs Windows Server 2016. Server1 has the Windows Application Proxy role service installed. You are publishing an application named App1 that will use Integrated Windows authentication as shown in the following graphic.

 


 

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

 


 

Correct Answer:


 

QUESTION 86

HOTSPOT

You have a server named Server1 that runs Windows Server 2016 server.

 

Server1 has the Docker daemon configured and has a container named Container1.

 

You need to mount the folder C:\Folder1 on Server1 to C:\ContainerFolder in Container1.

 

Which command should you run?

 

To answer, select the appropriate options in the answer area.

 


 

Correct Answer:


 

 

QUESTION 87

You have a server named Server1 that runs Windows Server 2016. You need to configure Server1 as a multitenant RAS Gateway. What should you install on Server1?

 

A.

the Network Policy and Access Services server role

B.

the Remote Access server rote

C.

the Data Center Bridging feature

D.

the Network Controller server role

 

Correct Answer: B

 

 

QUESTION 88

HOTSPOT

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

 

A company named Contoso, Ltd. has several servers that run Windows Server 2016. Contoso has a Hyper-V environment that uses failover clustering and Windows Server Update Services (WSUS). The environment contains several Windows containers and several virtual machines.

 

The WSUS deployment contains one upstream server that is located on the company’s perimeter network and several downstream servers located on the internal network. A firewall separates the upstream server from the downstream servers.

 

You plan to deploy a human resources application to a new server named HRServer5. HRServer5 contains a FAT32-formatted data volume.

 

The CIO of Contoso identifies the following requirements for the company’s IT department:

 

Deploy a failover cluster to two new virtual machines.

Store all application databases by using Encrypted File System (EFS).

Ensure that each Windows container has a dedicated IP address assigned by a DHCP server.

Produce a report that lists the processor time used by all of the processes on a server named Server1 for five hours.

Encrypt all communication between the internal network and the perimeter network, including all WSUS communications.

Automatically load balance the virtual machines hosted in the Hyper-V cluster when processor utilization exceeds 70 percent.

 

You need to create a Data Collector Set to meet the requirement for the processor time report.

 

What command should you run to create the Data Collector Set?

 

To answer, select the appropriate options in the answer area.

 


 

Correct Answer:


 

 

QUESTION 89

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, white others might not have a correct solution.

 

You have a server named Server1 that runs Windows Server 2016. Server1 hosts a line-of- business application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory.

 

You need to log an event in the Application event log whenever App1 consume more than 4 GB of memory.

 

Solution: You create a system configuration information data collector.

 

Does this meet the goal?

A.

Yes

B.

No

 

Correct Answer: B

 

QUESTION 90

Your network contains three Hyper-V hosts. You add all of the hosts to a cluster. You need to create highly available storage spaces that connect to directly attached storage on the hosts. Which cmdlet should you use?

 

A.

Enable-ClusterStorageSpacesDiret

B.

Set-StoragePool

C.

Add-ClusterDisk

D.

Update-ClusterVirtualMachineConfiguration

 

Correct Answer: A

 

 


 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.