Configuring and Deploying a Private Cloud with System Center 2012
Question No: 91 HOTSPOT – (Topic 9)
You manage a System Center 2012 R2 Virtual Manager (VMM) deployment that contains
the servers configured as shown in the following table.
You integrate VMM with Service Provider Foundation and App Controller.
You need to create a tenant self-service user role for the users who connect to VMM by using App Controller.
On which server should you perform each action? To answer, select the appropriate options in the answer area.
Question No: 92 – (Topic 9)
Your network contains a System Center 2012 Virtual Machine Manager (VMM)
The infrastructure contains 50 virtual machines.
You need to deploy a Microsoft SQL Server dedicated administrator connection (DAC) package to a service.
What should you create from the VMM Administrator Console?
A Run As account
A Capability Profile
A virtual machine template
An Application Profile
Answer: D Explanation:
Question No: 93 – (Topic 9)
A company uses System Center 2012 R2 Operations Manager and System Center 2012 R2 Virtual Machine Manager (VMM). You need to provide a detailed overview of the fabric that services the company#39;s private clouds.
What should you do?
Import the Management Pack for System Center 2012 R2 VMM Fabric Dashboard.
Use the System Center Global Service Monitor as part of the monitoring strategy.
Import the Management Pack for System Center 2012 Service Manager.
Use the Windows Intune service as part of the monitoring strategy.
Question No: 94 – (Topic 9)
Your company has a datacenter in Los Angeles.
The datacenter contains a System Center 2012 infrastructure that contains the following roles:
->Virtual Machine Manager(VMM)
The company is evaluating an auditing policy.
You need to recommend a portal that must be used to ensure that the following tasks are audited:
->When an administrator updates a service
->When a user requests a change to a service
->When an administrator approves a change to a service
You need to recommend a solution that meets the requirements of the compliance policy. Which portal should you include in the recommendation?
The Service Manager Self-Service Portal
The Virtual Machine Manager Self-Service Portal (VMMSSP) 2.0
The Virtual Machine Manager Self-Service Portal (VMMSSP)
The App Controller portal
Question No: 95 – (Topic 9)
Your company has a private cloud managed by a System Center 2012 Virtual Machine Manager (VMM) infrastructure.
You need to add a hardware load balancing solution to the private cloud. You deploy the hardware load balancer to the network.
What should you do before you add the hardware load balancer to the fabric? (Each correct answer presents part of the solution, Choose two.)
Create a logical network.
Create a VIP template.
Create a Run As Account.
Install a configuration provider.
Install the Network Load Balancing (NLB) feature.
Create a User Role.
Answer: B,D Explanation:
B: Before you can use a hardware load balancer or NLB, you must create associated virtual IP (VIP) templates.
D: To add supported hardware load balancers, you must install a configuration provider that is available from the load balancer manufacturer.
Question No: 96 – (Topic 9)
Your company has a private cloud managed by a System Center 2012 Virtual Machine Manager (VMM) infrastructure. You add a new SAN to the network, and the you run a storage discovery. You discover that the SAN resources are not discovered by VMM. You verify that the VMM server can communicate with the SAN. You need to ensure that VMM can discover the new SAN. What should you install?
a third-party iSCSI initiator
a Storage Management Initiative – Specification (SMI-S) provider.
the Multipath I/O (MPIO) feature
the Windows System Resource Manager (WSRM) feature.
Answer: B Explanation:
Question No: 97 – (Topic 9)
You deploy a System Center 2012 Service Manager infrastructure. You plan to update the scheduled backups to include Service Manager information. You need identify which databases must be added to the scheduled backups. Which two databases should you identify? (Each correct answer presents part of the solution. Choose two.)
Answer: B,D Explanation:
The ServiceManager database is sometimes referred to as the CMDB. It is the central store of all configuration items and work items managed by Service Manager. It also stores all the customizations and configuration for the Service Manager product itself.
DWStagingAndConfig stores the configuration for the data warehouse and is used as a temporary place to stage the data as it moves from the ServiceManager database into the other parts of the data warehouse (DWRepository and DWDataMart) http://technet.microsoft.com/en-us/library/hh519598.aspx http://social.technet.microsoft.com/Forums/en- US/systemcenterservicemanager/thread/5cfda2d9-0bca-43b4-a57f-653d638e78e3/
Question No: 98 – (Topic 9)
You plan to deploy a service named Service1. When you deplay Service1, you plan to deploy several SQL scripts to a virtual machine named VM1 by using an Application Profile. You need that ensure that a user named User1 is prompted for the name of the SQL instance during the deployment of Service1.
Which value should you add to the Application Profile
Answer: C Explanation:
Question No: 99 – (Topic 9)
A company has a Windows Server 2012 R2 server that has the Hyper-V role installed. The server hosts 12 virtual machines (VMs) that run Windows Server 2012 R2. The company plans to deploy System Center 2012 R2 Data Protection Manager (DPM). The company has identified the following requirements for the DPM deployment:
Allow files and folders on VMs to be recovered allow recovery of data to a network
Share minimize the number of DPM protection agents that you must deploy
You need to implement the backup solution.
Which two actions should you perform? Each correct answer presents part of the solution.
Deploy a DPM server.
Deploy the DPM protection agent to VMs.
Add the Hyper-V role to the DPM server.
Configure DPM to perform guest-level backups of the VMs.
Configure DPM to perform host-level backups of the VMs.
Answer: A,C Explanation:
DPM protection supports the following scenarios:
/ (this scenario) Protects virtual machines that are hosted on stand-alone servers that run Hyper- V and that use local or directly attached storage.
/ Protects virtual machines that run on a cluster. The cluster uses Cluster Shared Volumes (CSV) storage. /Protects virtual machines that run on a stand-alone server or cluster and that use SMB 3.0 file server storage.
/Protects virtual machines that are running during a live migration.
* Example: Protection for virtual machines on a stand-alone server that is running Hyper-V
Hyper-V on Standalone This configuration protects one or more virtual machines on a stand- alone host computer. Storage can be local on the host server, or directly attached to it, for example a hard drive, a storage area network (SAN) device, or a network attached storage (NAS) device. Alternatively, the host server might use SMB 3.0 storage on an alternate file server. The DPM protection agent must be installed on all hosts and on the file server if storage is hosted by using SMB 3.0.
Incorrect: Not B: Would not minimize thenumber of Protection Agents.
Question No: 100 – (Topic 9)
An organization has private and public cloud resources. The organization has Windows Server 2012 R2 servers that have the Hyper-V role installed. You have one four-node cluster of Hyper-V host servers.
You use System Center 2012 R2.
The virtual machines that run on the cluster must remain online when you install updates on the Hyper-V host servers.
You need to install updates on the Hyper-V host servers. What should you do?
Configure Windows Server Update Services (WSUS) to provide updates to the virtual
machines hosted on the cluster.
Add all the servers to a collection in System Center 2012 R2 Configuration Manager. Deploy updates to the collection.
Create orchestrated updates of Hyper-V host clusters by using System Center 2012 R2 Virtual Machine Manager (VMM).
Configure Windows Update on the Hyper-V host servers to download updates from Microsoft Update.
Answer: C Explanation:
VMM rolls through the host cluster, remediating one cluster node at a time. If a cluster node is compliant, VMM bypasses that node.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|