Microsoft 70-745 Implementing a Software-Defined Datacenter Exam Practice Test

Page: 1 / 14
Total 99 questions
Question 1

You need to ensure that the existing VMs meet the requirements.

What should you do?



Answer : D


Question 2

A company has a Microsoft System Center Virtual Machine Manager (SCVMM) environment that uses Network Controller.

You need to ensure that you can perform Network Controller diagnostics. What should you do?



Answer : C


Question 3

A company plans to deploy Storage Spaces Direct m their Microsoft System Center Virtual Machine Manager (SCVMM) environment. You need to design a storage pool that maximizes performance and storage capacity. Which design should you use?



Answer : D


Question 4

You administer a Microsoft System Center Virtual Machine Manager (SCVMM) infrastructure. You have a Microsoft Azure subscription. You must design a backup strategy that meets the following requirements:

* Back up the SCVMM hosts, virtual machines (VMs), and workloads.

* Use a protection agent to perform the backups.

* Automate the backup process.

You need to recommend a backup solution. What should you recommend?



Answer : B


Question 5

You deploy Microsoft System Center Operations Manager (SCOM) and configure Active Directory Domain Services {AD OS) Integration.

Monitoring of servers must begin immediately after you Install the SCOM agent.

You need to deploy the SCOW agent to all servers in the environment.

Solution: Use System Center Configuration Manager (SCCM) to deploy the SCOM agent.

Does me solution meet the goal?



Answer : A


Question 6

You manage Microsoft system virtual Machine Manager (SCVMM).

You need to secure network traffic.

Which two protocols can you secure by using port access control lists (ACLs)? Each correct answer presents a complete solution.



Answer : D, E

General guidelines for what an access control list consist of are as follows:

Access control list name (depending on the router it could be numeric or combination of letters and

numbers)

A sequence number or term name for each entry

A statement of permission or denial for that entry

A network protocol and associated function or ports

- Examples include IP, IPX, ICMP, TCP, UDP, NETBIOS and many others

Destination and Source targets

- These are typically addresses and can be defined as a single discrete address, a range or subnet, or

all addresses Additional flags or identifiers These additional statements request additional functions when a match is found for the statement. These flags vary for each protocol but a common flag added to statements is the log feature that records any match to the statement into the router log

References:

https://www.pluralsight.com/blog/it-ops/access-control-list-concepts


Question 7

You manage Microsoft System Center Virtual Machine Manager (SCVMM). You plan to implement a software load balancer (SLB) Multiplexer (MUX).

You need to configure the Microsoft Hyper-V host servers to host the MUX.

What should you do?



Page:    1 / 14   
Total 99 questions