Your network includes Windows Server 2008 R2 Hyper-V failover clusters that support highly available virtual machines (VMs). You manage virtual machines by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to deploy a 

题目

Your network includes Windows Server 2008 R2 Hyper-V failover clusters that support highly available virtual machines (VMs). You manage virtual machines by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to deploy a large number of VMs to the failover clusters. All VMs must remain available when one node of each cluster is offline. You need to determine the best placement for the new VMs among the clusters. Which two actions should you perform?()

  • A、For each cluster, set the cluster reserve to 1
  • B、Determine the placement for each VM by using the data that is generated by running the Get-VMPerformance PowerShell cmdlet
  • C、Determine the placement for each VM by using the data that is generated by running the Get-VMHostRating PowerShell cmdlet
  • D、For each cluster, set the cluster reserve to 0

相似考题
更多“Your network includes”相关问题
  • 第1题:

    Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()

    • A、Enable Cluster Shared Volumes (CSVs).
    • B、In Failover Cluster Manager, edit the properties of a single VM.
    • C、In Virtual Network Manager, edit the properties of the virtual network.
    • D、In Hyper-V Manager, take each VM offline and edit the settings of each VM.

    正确答案:B

  • 第2题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

    • A、 core layer
    • B、 bridging two VLANs on one switch
    • C、 between two Layer 2 devices with trunking
    • D、 between two Layer 2 devices without trunking

    正确答案:C,D

  • 第3题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第4题:

    All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue.  What should you do?()

    • A、 Use the nbtstat command-line tool on Client1.
    • B、 Use the pathping command-line tool on Client1.
    • C、 Run the nbtstat -r command on the RRAS server.
    • D、 Run the ping -a Client1 command on the RRAS server.

    正确答案:B

  • 第5题:

    单选题
    Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()
    A

    Enable Cluster Shared Volumes (CSVs).

    B

    In Failover Cluster Manager, edit the properties of a single VM.

    C

    In Virtual Network Manager, edit the properties of the virtual network.

    D

    In Hyper-V Manager, take each VM offline and edit the settings of each VM.


    正确答案: A
    解析: 暂无解析

  • 第6题:

    单选题
    You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()
    A

    Set the driver signing option to block.

    B

    Set the driver signing option to ignore.

    C

    In the computer’s BIOS, reserve an unused IRQ for ISA devices.

    D

    In the Device Manager, configure the second ISA network adapter to use an unused IRQ.


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    Your fireman’s outfit includes a(n)().
    A

    chemical protection face shield

    B

    approved work vest

    C

    self-contained breathing apparatus

    D

    marlinspike


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
    A

    Enable the highest level of Syslogging available to ensure you log all possible event messages

    B

    Use SSH to access your Syslog information

    C

    Log all messages to the system buffer so that they can be displayed when accessing the router

    D

    Syncronize clocks on the network with a protocol such as Network Time Protocol


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster. Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster. How many servers should you recommend?()
    A

    Five

    B

    Three

    C

    Four

    D

    Six


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
    A

    core layer

    B

    bridging two VLANs on one switch

    C

    between two Layer 2 devices withtrunking

    D

    between two Layer 2 devices withouttrunking


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()
    A

    Right-click and click the Diagnose option in the Connect to a network window.

    B

    Set the security type value to No authentication in the wireless network properties dialog box.

    C

    Click the Manually connect to a wireless network option in the Set up a connection or network window.

    D

    In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.

    E

    Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    单选题
    You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the internet. Your company’s network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view//server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do? ()
    A

    Stop and then start the TCP/IP NetBIOS helper service on your computer.

    B

    Stop and then start the DNS client service on your computer.

    C

    Add a HOSTS entry for server1 to your computer.

    D

    Add a LMHOSTS entry for server1 to your computer.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

    • A、 has a permissive interface that is used to monitor networks
    • B、 is an active device in the traffic path
    • C、 passively listens to network traffic
    • D、 has a promiscuous interface that is used to monitor the network

    正确答案:C,D

  • 第14题:

    In what way does Cisco SMARTnet help customers protect their network investments?()

    • A、allows them to acquire replacement hardware as needed instead of carrying it in inventory
    • B、includes upgrade insurance
    • C、includes Cisco Learning Credits for staff training
    • D、provides them with trade-in incentives for their end-of-life products

    正确答案:A

  • 第15题:

    Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()

    • A、Use the Remote Desktop Connection Broker and failover clustering
    • B、Use the Remote Desktop Gateway and network load balancing
    • C、Use network load balancing and failover clustering
    • D、Use DNS round-robin and network load balancing

    正确答案:A

  • 第16题:

    You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()

    • A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.
    • B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.
    • C、Change the share name to TestKingDocs#.
    • D、Change the share name to TestKingDocs$.

    正确答案:D

  • 第17题:

    单选题
    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()
    A

    Disable the Connect even if the network is not broadcasting option.

    B

    In the Network and Sharing Center window, click the Diagnose and repair option.

    C

    Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.

    D

    Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
    A

    Enable the Require domain controller to unlock policy.

    B

    Set the Number of previous logons to cache policy to 0.  

    C

    Remove all user and group accounts from the Log on locally user right. 

    D

    Remove all user and group accounts from the Access this computer from the network user right. 


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which phase includes conducting Cisco Unified Communications network traffic analysis and capacity planning in order to ensure high availability()
    A

    Design

    B

    Prepare

    C

    Maintain

    D

    Optimize


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Your network includes several virtual machines (VMs) that are distributed across a Windows Server 2008 R2 Hyper-V failover cluster. You need to be able to configure the VMs in a Network Load Balancing (NLB) cluster. What should you do on each VMs network adapter?()
    A

    Enable MAC address spoofing.

    B

    Disable MAC address spoofing.

    C

    Enable TCP Offload Engine(TOE).

    D

    Disable TCP Offload Engine(TOE).


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which includes an activity to host a workshop that focuses on the identification and configuration of the actual network components (routers, servers, local-area network or LAN, and so on) that will be incorporated to run and support the Cisco Unified Communications system()
    A

    Implement

    B

    Design

    C

    Plan

    D

    Prepare


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析