Health Care > EXAM > Microsoft 70 -412 Midterm review QUESTIONS AND ANSWERS| GRADED A+ (All)

Microsoft 70 -412 Midterm review QUESTIONS AND ANSWERS| GRADED A+

Document Content and Description Below

Microsoft 70 -412 Midterm review What is used to transparently distribute traffic equally across multiple servers by using virtual IP addresses and a shared name? Correct Answer: Network Loa... d Balancing (NLB Which of the following would use NLB to provide fault tolerance? Correct Answer: Shared folder What is the maximum number of nodes that is supported in a Windows Server 2012 R2 NLB cluster? Correct Answer: 32 What is used to detect the failure of cluster nodes? Correct Answer: Heartbeats When you add or remove a node from an NLB cluster, what must happen? Correct Answer: Convergence What specifies how NLB directs traffic based on the port and protocol? Correct Answer: Port rules What determines how servers are balanced with NLB? Correct Answer: affinity Which mode allows an NLB cluster to use two MAC addresses for the NLB network adapter? Correct Answer: Multicast mode Which action blocks all new connections without terminating existing sessions? Correct Answer: drainstop Which mode would you choose to configure affinity? Correct Answer: Multiple hosts Which type of clustering is used for back-end databases? Correct Answer: failover cluster What is the maximum number of nodes you can have in a single cluster? Correct Answer: 64 What port do heartbeats use? Correct Answer: 3343 Which type of storage allows multiple nodes to access the storage at the same time? Correct Answer: Cluster Shared Volume (CSV) What allows you to automatically patch a cluster node with little or no downtime? Correct Answer: Cluster-Aware Updating What type of quorum would you use if you have three nodes in a failover cluster? Correct Answer: Node Majority What Windows PowerShell cmdlet would you use to check the progress of updates when using CAU? Correct Answer: Get-CAURUN Which of the following allows you to deploying a failover cluster without creating an Active Directory computer account for the cluster network name? Correct Answer: An Active Directory-detached cluster You are going to create a failover cluster that connects to an iSCSI SAN. What is the minimum number of network adapters recommended for each node? Correct Answer: 2 For a failover cluster, what type of network would you use to communicate with an iSCSI device? Correct Answer: public-and-private You are an administrator for the Contoso Corporation. You have a two-node failover cluster with a witness disk. You need to take one of the servers down for maintenance. What should you do Correct Answer: Drain the roles for the server that you want to shut down Which do you configure to make a service or application highly available? Correct Answer: role Which type of role is designed to work with Windows Server 2012 R2 failover cluster? Correct Answer: cluster-aware clustered role Which SMB feature allows multiple nodes to access a clustered disk at the same time? Correct Answer: SMB Scale Out Which type of file server resembles the file server used in Windows Server 2008 R2 Correct Answer: General Use File Server Which type of volume should you use for highly available virtual machine? Correct Answer: CSV What do you configure if you want one node to be an active node while it is available? Correct Answer: preferred owner What Windows PowerShell cmdlet is used to enable VM monitoring? Correct Answer: Add-ClusterVMMonitoredItem Which type of application or services would you configure on a cluster for an application or service that was not made for a cluster Correct Answer: generic clustered role When using remote management tools to perform LM, what needs to be configured? Correct Answer: Constrained Delegation Which process takes an existing partially or completely configured VM and creates other VMs without having to perform the installation and configuration from scratch? Correct Answer: Exporting Which process takes an existing set of VM files and recreates the exact same VM? Correct Answer: Importing What is the name of the process for moving an entire VM or parts of a VM to another physical server without a cluster? Correct Answer: Live Migration What is the name of the process for moving an entire VM or parts of a VM to another physical server using a cluster? Correct Answer: Quick Migration In which file should all instances of the virtual hard disk file name be updated to reflect the converted file name? Correct Answer: OVH XML Which of the following tools do you need to perform V2V conversions? Correct Answer: SCVMM You need to create a VM template to create 20 identical VMs. How do you do this? Correct Answer: Run Sysprep on the VM, power it down, and export and import the VM registering the VM in place with the existing unique ID You need to migrate a VM created in the VirtualBox hypervisor. You do not need to cap- ture local user accounts in your migration. Which of the following tools do you use? Correct Answer: OVF Import/Export Tool What method of file sharing is used with UNIX and Linux machines? Correct Answer: NFS When using NFS, how do you connect to the shared folder? Correct Answer: You mount the volume to a local folder What allows to integrate Windows users into an existing UNIX or Linux environment? Correct Answer: Identity Management for UNIX What command do you use to install Identity Management for UNIX? Correct Answer: dism.exe Which Windows Server 2012 R2 server acts as a WAN accelerator? Correct Answer: BranchCache Which mode in BranchCache allows you to store the cache among multiple computers running Windows 8.1 Correct Answer: distributed cache mode Which primary tool is used when classifying files? Correct Answer: File Server Resource Manager What do you use to extend the Active Directory schema to store UNIX attributes? Correct Answer: Server for NFS role Which of the following uses a trusted identity provider to provide authentication? Correct Answer: claims-based access control Which digital identification is used by a user or computer? Correct Answer: token Which identity provider is in Windows Server 2012 R2? Correct Answer: Security Token Service What is used to automatically label files based on content? Correct Answer: classification rules What do you specify when you create a claim type? Correct Answer: claim name [Show More]

Last updated: 1 year ago

Preview 1 out of 7 pages

Add to cart

Instant download

Reviews( 0 )

$15.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
43
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 12, 2022

Number of pages

7

Written in

Seller


seller-icon
Crum

Member since 1 year

60 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 12, 2022

Downloads

 0

Views

 43

Document Keyword Tags

Recommended For You

Get more on EXAM »

$15.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·