You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()
第1题:
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to place multiple Hyper-V servers in the perimeter network (also known as DMZ). You need to be able to manage the Hyper-V servers by using VMM. Which two actions should you perform for each server in the perimeter network?()
第2题:
You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You have three Windows Server 2008 R2 Hyper-V servers in a failover cluster. You need to ensure that all virtual machines (VMs) are distributed automatically across the host servers, and that the VMs will automatically fail over to the most appropriate host server. What should you do?()
第3题:
You have a Windows Server 2008 R2 Hyper-V failover cluster. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to find out whether the failover cluster is properly configured to support highly available virtual machines (VMs). Which PowerShell cmdlet should you run?()
第4题:
You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Testers are members of an AD security group named Test. You need to ensure that members of the Test group can create VMs on a specific host server by using the VMM Self-Service Portal. What should you do?()
第5题:
Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are creating a virtual test environment by installing two child partitions. The test environment must be completely isolated from all production servers. You need to ensure that the child partitions can communicate with each other. Which connection type should you configure?()
第6题:
You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual machines (VMs). You need to deploy a cloned VM and automatically assign it a different name. Where should you deploy the cloned VM?()
第7题:
You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You have three Windows Server 2008 R2 Hyper-V servers in a failover cluster. You need to ensure that all virtual machines (VMs) are distributed automatically across the host servers, and that the VMs will automatically fail over to the most appropriate host server. What should you do?()
第8题:
Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Monitoring. You are configuring a Windows Server 2008 R2 Hyper-V server that hosts several virtual machines (VMs). You need to ensure that members of the Monitoring group can only stop and start VMs on the host server. What should you do?()
第9题:
You manage your Hyper-V environment by using Microsoft System Center Virtual Machine Manager(VMM)2008 R2. You plan to perform a virtual-to-virtual (V2V) conversion of several virtual machines(VMs). In VMM,you need to configure the default placement options to consolidate the VMs on the fewest possible host servers. What should you do?()
第10题:
Create a Self-Service user role and add the Development group to this role.
Create a Delegated Administrator user role and add the Development group to this role.
In Authorization Manager, create a role on the client computer of each member of the Development group, and add the Development group to this role.
Install Hyper-V Manager on the client computer of each member of the Development group,and grant the Development group administrative privileges on the specific server.
第11题:
vmfs
vmfs raw
vmfs Raw Device Map
vmfs Pass through Raw Device Map
第12题:
You are consolidating your data center by using Windows Server 2008 R2 Hyper-V servers. You are performing virtual-to-virtual (V2V) conversions from Microsoft Virtual Server 2005 R2 and VMware ESX environments by using Microsoft System Center Virtual Machine Manage (VMM) 2008 R2. You need to place the virtual machines (VMs) to fully utilize the Windows Server 2008 R2 host servers. What should you do?()
第13题:
Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs). You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration. Which two actions should you include in your design?()
第14题:
Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Development. You have a member server that runs Windows Server 2008 R2 with the Hyper-V role installed. You need to ensure that Development group members can only manage virtual machines (VMs). Development group members must not have administrative privileges on the host server. What should you use?()
第15题:
Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()
第16题:
You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()
第17题:
Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each virtualization host contains a minimum of 15 virtual machines (VMs). You need to ensure that network technicians can manage and create virtual networks on the Hyper-V hosts. The technicians must be prevented from configuring other Hyper-V settings. What should you include in the recommendation?()
第18题:
Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs). You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration. Which two actions should you include in your design?()
第19题:
Your virtual environment includes Hyper-V host servers and VMware ESX Server hosts. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to enable non-administrative users to manage snapshots or checkpoints for virtual machines (VMs) that are hosted on either host system. What should you do?()
第20题:
a port number
an encryption key
the VMM server name
the URL of the VMM Self-Service Portal
第21题:
Create a host group. Add the host servers that the user will manage to the host group.
Create a failover cluster. Join the host servers that the user will manage to the failover cluster.
Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.
Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.