Download Upgrading Your Skills to MCSA: Windows Server 2016.70-743.Pass4Sure.2018-09-13.46q.vcex

Vendor: Microsoft
Exam Code: 70-743
Exam Name: Upgrading Your Skills to MCSA: Windows Server 2016
Date: Sep 13, 2018
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You have a Hyper-V host named Server1 that runs Windows Server 2016. 
Server1 has a virtual machine named VM1. VM1 is configured to run the Docker daemon. 
On VM1, you have a container network that uses transparent mode. 
You need to ensure that containers that run on VM1 can obtain IP addresses from DHCP. 
What should you do?
  1. On VM1, run docker network connect.
  2. On Server1, run docker network connect.
  3. On VM1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter –MacAddressSpoofing On.
  4. On Server1, run Get-VMNetworkAdapter –VMName VM1 | Set-VMNetworkAdapter – MacAddressSpoofing On.
Correct answer: D
Explanation:
If the container host is virtualized, and you wish to use DHCP for IP assignment, you must enable MACAddressSpoofing. PS C:\> Get-VMNetworkAdapter -VMName ContainerHostVM | Set-VMNetworkAdapter -MacAddressSpoofing OnThe command needs to be run on the Hyper-V host. References: https://msdn.microsoft.com/en-us/virtualization/windowscontainers/management/container_networking
If the container host is virtualized, and you wish to use DHCP for IP assignment, you must enable MACAddressSpoofing. 
PS C:\> Get-VMNetworkAdapter -VMName ContainerHostVM | Set-VMNetworkAdapter -MacAddressSpoofing On
The command needs to be run on the Hyper-V host. 
References: https://msdn.microsoft.com/en-us/virtualization/windowscontainers/management/container_networking
Question 2
You have a server named Server1 that runs Windows Server 2016. You install the Docker daemon on Server1. 
You need to configure the Docker daemon to accept connections only on TCP port 64500. 
What should you do?
  1. Edit the configuration.json file.
  2. Run the Set-ServiceWindows PowerShell cmdlet.
  3. Edit the daemon.json file.
  4. Run the New-NetFirewallRule cmdlet
Correct answer: C
Explanation:
Configure Docker with Configuration File The preferred method for configuring the Docker Engine on Windows is using a configuration file. The configuration file can be found at 'c:\ProgramData\docker\config\daemon.json'.Only the desired configuration changes need to be added to the configuration file. For example, this sample configures the Docker Engine to accept incoming connections on port 64500. All other configuration options will use default values. {      "hosts": ["tcp://0.0.0.0:64500"]} References: https://msdn.microsoft.com/en-us/virtualization/windowscontainers/docker/configure_docker_daemon
Configure Docker with Configuration File 
The preferred method for configuring the Docker Engine on Windows is using a configuration file. The configuration file can be found at 'c:\ProgramData\docker\config\daemon.json'.
Only the desired configuration changes need to be added to the configuration file. For example, this sample configures the Docker Engine to accept incoming connections on port 64500. All other configuration options will use default values. 
     "hosts": ["tcp://0.0.0.0:64500"]
References: https://msdn.microsoft.com/en-us/virtualization/windowscontainers/docker/configure_docker_daemon
Question 3
You have a failover cluster named Cluster1. 
A virtual machine named VM1 is a highly available virtual machine that runs on Cluster1. A custom application named App1 runs on VM1. 
You need to configure monitoring on VM1. If App1 adds an error entry to the Application even log, VM1 should be automatically rebooted and moved to another cluster node. 
Which tool should you use?
  1. Resource Monitor
  2. Failover Cluster Manager
  3. Server Manager
  4. Hyper-V Manager
Correct answer: B
Explanation:
Do you have a large number of virtualized workloads in your cluster? Have you been looking for a solution that allows you to detect if any of the virtualized workloads in your cluster are behaving abnormally? Would you like the cluster service to take recovery actions when these workloads are in an unhealthy state? In Windows Server 2012/2016, there is a great new feature, in Failover Clustering called “VM Monitoring”, which does exactly that – it allows you monitor the health state of applications that are running within a virtual machine and then reports that to the host level so that it can take recovery actions. VM Monitoring can be easily configured using the Failover Cluster Manager through the following steps:Right click on the Virtual Machine role on which you want to configure monitoring Select “More Actions” and then the “Configure Monitoring” options You will then see a list of services that can be configured for monitoring using the Failover Cluster Manager. References: https://blogs.msdn.microsoft.com/clustering/2012/04/18/how-to-configure-vm-monitoring-in-windows-server-2012/
Do you have a large number of virtualized workloads in your cluster? Have you been looking for a solution that allows you to detect if any of the virtualized workloads in your cluster are behaving abnormally? Would you like the cluster service to take recovery actions when these workloads are in an unhealthy state? In Windows Server 2012/2016, there is a great new feature, in Failover Clustering called “VM Monitoring”, which does exactly that – it allows you monitor the health state of applications that are running within a virtual machine and then reports that to the host level so that it can take recovery actions. 
VM Monitoring can be easily configured using the Failover Cluster Manager through the following steps:
  • Right click on the Virtual Machine role on which you want to configure monitoring 
  • Select “More Actions” and then the “Configure Monitoring” options 
  • You will then see a list of services that can be configured for monitoring using the Failover Cluster Manager. 
References: https://blogs.msdn.microsoft.com/clustering/2012/04/18/how-to-configure-vm-monitoring-in-windows-server-2012/
Question 4
You have a server named Server1 that runs Windows Server 2016. 
The disk configuration for Server1 is shown in the exhibit. 
  
You add Server1 to a cluster. 
You need to ensure that you can use Disk 1 for Storage Spaces Direct. 
What should you do first?
  1. Set Disk 1 to offline.
  2. Convert Partition (E:) to ReFS.
  3. Convert Disk 1 to a dynamic disk.
  4. Delete Partition (E:).
Correct answer: D
Explanation:
The disks used in Storage Spaces Direct cannot contain existing partitions.
The disks used in Storage Spaces Direct cannot contain existing partitions.
Question 5
Your network contains an Active Directory domain. The domain contains two Hyper-V hosts. 
You plan to perform live migrations between the hosts. 
You need to ensure that the live migration traffic is authenticated by using Kerberos. 
What should you do first?
  1. From Server Manager, install the Host Guardian Service server role on a domain controller.
  2. From Active Directory Users and Computers, add the computer accounts for both servers to the Cryptographic Operators group.
  3. From Active Directory Users and Computers, modify the Delegation properties of the computer accounts for both servers.
  4. From Server Manager, install the Host Guardian Service server role on both servers.
Correct answer: C
Explanation:
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation before you proceed to the rest of the steps. To configure constrained delegation Open the Active Directory Users and Computers snap-in. From the navigation pane, select the domain and double-click the Computers folder. From the Computers folder, right-click the computer account of the source server and then click Properties. In the Properties dialog box, click the Delegation tab. On the delegation tab, select Trust this computer for delegation to the specified services only. Under that option, select Use Kerberos only. References:https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation before you proceed to the rest of the steps. 
To configure constrained delegation 
  • Open the Active Directory Users and Computers snap-in. 
  • From the navigation pane, select the domain and double-click the Computers folder. 
  • From the Computers folder, right-click the computer account of the source server and then click Properties. 
  • In the Properties dialog box, click the Delegation tab. 
  • On the delegation tab, select Trust this computer for delegation to the specified services only. Under that option, select Use Kerberos only. 
References:
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering
Question 6
You have a four-node Hyper-V cluster named Cluster1. 
A virtual machine named VM1 runs on Cluster1. VM1 has a network adapter that connects to a virtual switch named Network1. 
You need to prevent a network disconnection on VM1 from causing VM1 to move to another cluster node. 
What command should you run? To answer, select the appropriate options in the answer area. 
Correct answer: To display the answer, ProfExam Simulator is required.
Explanation:
-VMName specifies the name of the virtual machine that has the virtual network adapter you want to configure. -NotMonitoredInCluster indicates whether to not monitor the network adapter if the virtual machine that it belongs to is part of a cluster. By default, network adapters for clustered virtual machines are monitored. References:https://docs.microsoft.com/en-us/powershell/module/hyper-v/set-vmnetworkadapter?view=win10-ps
-VMName specifies the name of the virtual machine that has the virtual network adapter you want to configure. 
-NotMonitoredInCluster indicates whether to not monitor the network adapter if the virtual machine that it belongs to is part of a cluster. By default, network adapters for clustered virtual machines are monitored. 
References:
https://docs.microsoft.com/en-us/powershell/module/hyper-v/set-vmnetworkadapter?view=win10-ps
Question 7
You have an Active Directory domain named Contoso.com. The domain contains servers named Server1, Server2 and Server3 that run Windows Server 2016. 
Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. You add a Hyper-V Replica Broker role named Broker1 to Cluster1. 
Server3 is a Hyper-V server. A virtual machine named VM1 runs on Server3. 
Live Migration is enabled on all three servers and it is configured to use Kerberos authentication only. 
You need to ensure that you can perform the migration of VM1 to Server2. 
What should you do?
  1. Add the Server3 computer account to the Replicator group on Server1 and Server2.
  2. Modify the Delegation settings on the Server3 computer account.
  3. Modify the Storage Migration settings on Server3.
  4. Modify the Cluster permissions for Cluster1.
Correct answer: B
Explanation:
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation before you proceed to the rest of the steps. To configure constrained delegation Open the Active Directory Users and Computers snap-in. For example, to do this from Server Manager, select the server if it not already selected. After the server is selected, click Tools, and then click Active Directory Users and Computers. This opens the Active Directory Users and Computers snap-in. From the navigation pane, select the domain and double-click the Computers folder. From the Computers folder, right-click the computer account of the source server and then click Properties. In the Properties dialog box, click the Delegation tab. On the delegation tab, select Trust this computer for delegation to the specified services only. Under that option, select Use Kerberos only. Click Add. Etc. References:https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspxhttps://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/manage/use-live-migration-without-failover-clustering-to-move-a-virtual-machinehttps://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering
If you have decided to use Kerberos to authenticate live migration traffic, configure constrained delegation before you proceed to the rest of the steps. 
To configure constrained delegation 
  • Open the Active Directory Users and Computers snap-in. For example, to do this from Server Manager, select the server if it not already selected. After the server is selected, click Tools, and then click Active Directory Users and Computers. This opens the Active Directory Users and Computers snap-in. 
  • From the navigation pane, select the domain and double-click the Computers folder. 
  • From the Computers folder, right-click the computer account of the source server and then click Properties. 
  • In the Properties dialog box, click the Delegation tab. 
  • On the delegation tab, select Trust this computer for delegation to the specified services only. Under that option, select Use Kerberos only. 
  • Click Add. 
Etc. 
References:
https://technet.microsoft.com/en-us/library/jj134199(v=ws.11).aspx
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/manage/use-live-migration-without-failover-clustering-to-move-a-virtual-machine
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering
Question 8
You have a server named Server1 that runs Windows Server 2016. Server1 has the Web Application Proxy role service installed. 
You are publishing an application named App1 that will use Integrated Windows authentication as shown in the following graphic. 
  
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. 
Correct answer: To display the answer, ProfExam Simulator is required.
Explanation:
Publish an Integrated Windows authenticated-based Application for WebBrowser Clients 1. Step 1: (configure the Backend server SPN – see first bulleted item below)Before you begin, make sure that you have done the following:Made sure that the Web Application Proxy servers are configured for delegation to the service principal names (SPN) of the backend servers. Created a non-claims-aware relying party trust for the application in the AD FS Management console. Configured the backend server to support Kerberos constrained delegation on the domain controller or by using the Set-ADUser cmdlet with the -PrincipalsAllowedToDelegateToAccount parameter. Note that if the backend server is running on Windows Server 2012 R2 or Windows Server 2012, you can also run this PowerShell command on the backend server. Verified that a certificate on the Web Application Proxy server is suitable for the application you want to publish. 1. Step 2: http//server2.contoso.com/publish/app1Use the same URL as the backend server URL. Web Application Proxy can translate host names in URLs, but cannot translate path names. Therefore, you can enter different host names, but you must enter the same path name. For example, you can enter an external URL of https://apps.contoso.com/app1/ and a backend server URL of http://app-server/app1/. However, you cannot enter an external URL of https://apps.contoso.com/app1/ and a backend server URL of https://apps.contoso.com/internal-app1/.References: https://technet.microsoft.com/en-us/library/dn383640(v=ws.11).aspx
Publish an Integrated Windows authenticated-based Application for WebBrowser Clients 
1. Step 1: (configure the Backend server SPN – see first bulleted item below)
Before you begin, make sure that you have done the following:
  • Made sure that the Web Application Proxy servers are configured for delegation to the service principal names (SPN) of the backend servers. 
  • Created a non-claims-aware relying party trust for the application in the AD FS Management console. 
  • Configured the backend server to support Kerberos constrained delegation on the domain controller or by using the Set-ADUser cmdlet with the -PrincipalsAllowedToDelegateToAccount parameter. Note that if the backend server is running on Windows Server 2012 R2 or Windows Server 2012, you can also run this PowerShell command on the backend server. 
  • Verified that a certificate on the Web Application Proxy server is suitable for the application you want to publish. 
1. Step 2: http//server2.contoso.com/publish/app1
Use the same URL as the backend server URL. 
Web Application Proxy can translate host names in URLs, but cannot translate path names. Therefore, you can enter different host names, but you must enter the same path name. For example, you can enter an external URL of https://apps.contoso.com/app1/ and a backend server URL of http://app-server/app1/. However, you cannot enter an external URL of https://apps.contoso.com/app1/ and a backend server URL of https://apps.contoso.com/internal-app1/.
References: https://technet.microsoft.com/en-us/library/dn383640(v=ws.11).aspx
Question 9
Your network contains three Hyper-V hosts. You add all of the hosts to a cluster. 
You need to create highly available storage spaces that connect to directly attached storage on the hosts. 
Which cmdlet should you use?
  1. Update-ClusterVirtualMachineConfiguration
  2. Enable-ClusterStorageSpacesDirect
  3. Set-StoragePool
  4. Add-ClusterDisk
Correct answer: B
Explanation:
The Enable-ClusterStorageSpacesDirect cmdlet enables highly available Storage Spaces that use directly attached storage Storage Spaces Direct (S2D) on a cluster.
The Enable-ClusterStorageSpacesDirect cmdlet enables highly available Storage Spaces that use directly attached storage Storage Spaces Direct (S2D) on a cluster.
Question 10
You are configuring a Windows Server 2016 failover cluster in a workgroup. 
Before installing one of the nodes, you run the ipconfig /all command and receive the following output. 
  
You need to ensure that Server1 can be added as a node in the cluster. 
What should you do?
  1. Configure a DNS suffix.
  2. Enable NetBIOS over TCP/IP.
  3. Change the Node Type to Broadcast.
  4. Assign a static IP address.
Correct answer: A
Explanation:
In addition to the pre-requisites of Single-domain clusters, there are additional pre-requisites for Multi-domain or Workgroup clusters in the Windows Server 2016 including Primary DNS Suffix Requirements. Each cluster node needs to have a primary DNS suffix. For Multi-domain Clusters: The DNS suffix for all the domains in the cluster, should be present on all cluster nodes…Note: Failover Clusters can now be created in the following configurations:Single-domain Clusters: Clusters with all nodes joined to the same domainMulti-domain Clusters: Clusters with nodes which are members of different domainsWorkgroup Clusters: Clusters with nodes which are member servers / workgroup (not domain joined)References: https://blogs.msdn.microsoft.com/clustering/2015/08/17/workgroup-and-multi-domain-clusters-in-windows-server-2016/
In addition to the pre-requisites of Single-domain clusters, there are additional pre-requisites for Multi-domain or Workgroup clusters in the Windows Server 2016 including Primary DNS Suffix Requirements. 
  • Each cluster node needs to have a primary DNS suffix. 
  • For Multi-domain Clusters: The DNS suffix for all the domains in the cluster, should be present on all cluster nodes…
Note: Failover Clusters can now be created in the following configurations:
  • Single-domain Clusters: Clusters with all nodes joined to the same domain
  • Multi-domain Clusters: Clusters with nodes which are members of different domains
  • Workgroup Clusters: Clusters with nodes which are member servers / workgroup (not domain joined)
References: https://blogs.msdn.microsoft.com/clustering/2015/08/17/workgroup-and-multi-domain-clusters-in-windows-server-2016/
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!