21 10 2014
Microsoft 70-247 Exam Questions Newly Updaed By Braindump2go(11-20)
You have a System Center 2012 Virtual Machine Manager (VMIM) infrastructure that contains a server named Server1. Server1 hosts the VMM library. You add a server named Server2 to the network. You install the Windows Deployment Services (WDS) server role on Server2.
You have the Install.wim file from the Windows Server 20008 R2 Service Pack 1 (SP1) installation media. You need to install Hyper-V hosts by using the bare-metal installation method.
What should you do first?
A. Convert Install.wim to a .vmc file.
B. Convert Install.wim to a .vhd file.
C. Add Install.wim to the VMM library.
D. Add Install.wim to the Install Images Container.
For the bare metal deployment, you need an operating system and one of the first steps to take is to create a bootable VHD for that operating system. This is done by using the WIM2VHD tool to take the install.wim file from your Windows Server 2008 R2 SP1 installation media and convert it.
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains 20 virtualization hosts. Each host contains 20 virtual machines.
You need to configure the network fabric. The solution must prevent the virtual machines from connecting to a VLAN.
What should you do from the Network Site properties?
A. set the VLAN ID to 0.
B. set the VLAN ID to 10.
C. set the IP subnet to FD4A::/32.
D. set the IP subnet to 192.168.1.0/20.
VLAN 0 means you want VLAN disabled. Use this setting when you don’t care about VLAN IDs.
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains a virtualization host named Server2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1). Server2 has the Hyper-V server role installed. You plan to deploy a service named Service1 to Server2. Service1 has multiple load-balanced tiers.
You need to recommend a technology that must be implemented on Server2 before you deploy Service1.
What should you recommend?
A. TCP offloading
B. the Network Policy and Access Services (NPAS) server role
C. the Multipath I/O (MPIO) feature
D. MAC address spoofing
If you want to deploy the service to a Windows Server 2008 R2-based Hyper-V host (with or without Service Pack 1), you must also enable MAC address spoofing for NLB to work correctly. If you do not, service deployment will fail. However, you cannot use the Enable spoofing of MAC addresses check box in the virtual machine template or the associated hardware profile to configure this setting. Instead, you must use the VMM command shell to configure this setting after you create the template, or in the hardware profile that you use for the template.
Your company has a private cloud that is managed by a System Center 2012 Virtual Machine Manager (VMM) infrastructure. The infrastructure contains a server named Server1 that has VMM installed.
You plan to deploy the Hyper-V server role to a server named Server2. Server2 runs Windows Server 2008 R2.
Server2 is member of a workgroup.
You need to add Server2 to the VMM fabric.
What should you do? (Each correct answer presents part of the solution. Choose three.)
A. From the VMM Administrator Console, run the Add Resource Wizard, and then click Windows
Server computers in a perimeter network.
B. From the VMM 2012 installation media, install the VMM agent on Server2.
C. From the VMM Administrator Console, run the Add Resource Wizard, and then click Windows
Server computer in an untrusted Active Directory domain.
D. Copy the SecurityFile.txt file from Server2 to Server1.
E. From the Services console on Server1, start the SSDP Discovery service.
F. Copy the ApplicationHost.config file from Server2 to Server1.
A: To add the Hyper-V host in the perimeter network In the VMM console, open the Fabric workspace.
In the Fabric pane, click Servers.
On the Home tab, in the Add group, click Add Resources, and then click Hyper-V Hosts and Clusters.
The Add Resource Wizard starts.
On the Resource location page, click Windows Server computers in a perimeter network, and then click Next.
On the Target resources page,
B: Before you can add a host that is on a perimeter network to VMM, you must install an agent locally on the server that you want to add.
D: To ensure that the SecurityFile.txt file is available to VMM On the target host, navigate to the folder where the security file is stored. By default, the location is C:\Program Files\Microsoft System Center 2012\Virtual Machine Manager. The name of the security file is SecurityFile.txt. Transfer the security file to a location that is accessible to the computer on which a VMM console is installed. For example, transfer the file to the computer where the VMM console is installed, to an internal file share, or to a USB flash drive.
Reference: How to Add Hyper-V Hosts in a Perimeter Network in VMM
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains five virtualization hosts. You add new storage to the network.
You need to discover the storage from the VMM Administrator Console.
What should you create first?
A. a Hardware Profile
B. a classification
C. a Run As Account
D. a Guest as Profile
Your network contains three datacenters. The datacenters are hosted in Seattle, Montreal, and Orlando. You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure.
You open the VMM Administrator Console as shown in the Administrator Console exhibit. (Click the Exhibit button.)
A user who is a member of the User1 role opens the VMM Administrator Console as shown in the User1 Console exhibit. (Click the Exhibit button.)
You need to ensure that User1 can view the servers in the Seattle host group. What should
you configure from the VMM Administrator Console?
A. the General property of the Seattle host group
B. the Run As Accounts property of User1
C. the Access property of a Run As Account
D. the Scope property of User1
The actual exam exhibit shows admin console with all three Clouds listed where User1’s console only has Montreal cloud listed.
Your company has a private cloud that is managed by a server named Server1. Server1 has System Center 2012 Virtual Machine Manager (VMM) installed.
You add a Hyper-V host named Server2 to the server fabric. Server2 is connected to a SAN named SAN1 by using Fiber Channel connections.
You need to optimize access to the LUNs in SAN1 from Server2. What should you do first?
A. Install the Multipath I/O (MPIO) feature on Server2.
B. Configure Server2 to connect to SAN 1 by using an iSCSI channel.
C. Install the Multipath I/O (MPIO) feature on Server1.
D. Configure Server1 to connect to SAN 1 by using an iSCSI channel.
The Multipath I/O (MPIO) feature must be added on each host that will access the Fibre Channel or iSCSI storage array. You can add the MPIO feature through Server Manager. If the MPIO feature is already enabled before you add a host to VMM management, VMM will automatically enable MPIO for supported storage arrays by using the Microsoft provided Device Specific Module (DSM). If you already installed vendor-specific DSMs for supported storage arrays, and then add the host to VMM management, the vendor-specific MPIO settings will be used to communicate with those arrays.
You install System Center 2012 Virtual Machine Manager (VMM) on a server named Server1. You configure the VMM fabric for networking.
You need to create an IP address pool.
What should you create first?
A. a Run As Account
B. a Hardware Profile
C. a logical network
D. a VIP template
Your network contains a server named Server1 that has System Center 2012 Virtual Machine Manager (VMM) installed. You have a host group named HG1. HG1 contains four virtualization hosts named Server2, Server 3, Server4, and Server5.
You plan to provide users with the ability to deploy virtual machines by using the Self-Service Portal. The corporate management policy states that only the members of a group named Group1 can place virtual machines on Server2 and Server3 and only the members of a group named Group2 can place virtual machines on Server4 and Server5.
You need to recommend a cloud configuration to meet the requirements of the management policy.
What should you recommend?
A. Create two clouds named Cloud1 and Cloud2. Configure placement rules for HG1.
B. Create two host groups named HG1\Group1 and HG1\Group2. Create one cloud for each new host group.
Move two servers to each host group.
C. Create two clouds named Cloud1 and Cloud2. Configure the custom properties of each cloud.
D. Create a host group named HG1\HG2. Create one cloud for HG1 and one cloud for HG2. Move two
servers to HG2.
Your network contains servers that have System Center 2012 Virtual Machine Manager (VMM) installed and servers that have System Center 2012 App Controller installed. You create a private cloud named Cloud1. You add a VMM connection in App Controller. You verify that you can connect to Cloud 1 from the App Controller portal.
A user named User1 fails to connect to Cloud1 from the App Controller portal, as shown in the exhibit. (Click the Exhibit button.) You need to ensure that User1 can connect to Cloud1 from the App Controller portal. What should you do?
A. From the VMM Administrator Console, modify the properties of Cloud1.
B. From the VMM Administrator Console, create a User Role.
C. From the App Controller portal, create a User Role.
D. From the App Controller portal, modify the properties of the VMM connection.
Virtual Machine Manager (VMM) to define the objects that
You can create user roles in System Center 2012
users can manage and the management operations that users can perform.
Braindump2go Microsoft 70-247 Exam Dumps New Version Released, Latest 194 Questions(Includes All Questions As the Microsoft Exam Centre)! Download the Full Version Right Now: http://www.braindump2go.com/70-247.html