网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()
A
Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion
B
Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversion
C
Perform a physical-to-virtual (P2V) conversion while the VMs are running
D
Perform a physical-to-virtual (P2V) conversion while the VMs are shutdown
参考答案
参考解析
解析:
暂无解析
更多 “单选题Your network environment includes the following elements: - Two Windows Server 2008 R2 Hyper-V servers - Two VMware ESX 3.5 servers - Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()A Shut down the VMs, and then perform a physical-to-virtual (P2V) conversionB Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionC Perform a physical-to-virtual (P2V) conversion while the VMs are runningD Perform a physical-to-virtual (P2V) conversion while the VMs are shutdown” 相关考题
考题
Your company uses Microsoft Application Virtualization (App - V). Your environment includes multiple client computer configurations, as shown in the following table.You need to deploy a 32 - bit application to all client computers.Which reference computer configuration should you use?()A.Config1 with App - V Sequencer 4.5 32 - bitB.Config2 with App - V Sequencer 4.6 64 - bitC.Config3 with App - V Sequencer 4.6 32 - bitD.Config4 with App - V Sequencer 4.6 64 - bit
考题
Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment
考题
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
考题
Which three of the following are elements of the Cisco Unified Wireless Network?()A、 Unified advanced serviceB、 client devicesC、 Catalyst switchesD、 network managementE、 mesh access pointsF、 VPN concentrator
考题
Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()A、Enable Cluster Shared Volumes (CSVs).B、In Failover Cluster Manager, edit the properties of a single VM.C、In Virtual Network Manager, edit the properties of the virtual network.D、In Hyper-V Manager, take each VM offline and edit the settings of each VM.
考题
Which statement best describes the differences between Cisco SMARTnet and Cisco SMARTnet Onsite?()A、 CiscoSMARTNet Onsite includes all of the elements of Cisco SMARTnet with the additionalprovision of onsite technician to perform parts replacementB、 CiscoSMARTnet Onsite is primarily attractive to customers who do not need to replace theirhardware immediately, but would still like an onsite technician to install and replace hardwareC、 CiscoSMARTnet Onsite includes certification classes and live network consulting at thecustomer siteD、 CiscoSMARTnet Onsite provides network monitoring for small-to-medium sized businesses andprovides onsite technical resources when hardware problems are detecteD
考题
Selling the total solution includes adding services and financing options which ensures your customer will remain satisfied with their purchase. Which of the following best describes the benefits of Selling options, storage, services, and financing to your clients?()A、More face time with the executivesB、Enhanced credibility, higher profits, less competitive pressureC、One source for elements, cleaner design, simpler supportD、Locks competitors out of account
考题
Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade. Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network. Which two sets of actions should your plan include?()A、Import the checkpoint into the test environment, and apply the application update for testingB、Create a checkpoint of the three VMs, and export the checkpoint to the test environmentC、Create three VMs in the test environment, attach the existing .vhd files, and apply the application update for testingD、Pause the three VMs, and copy the .vhd files to the test environment
考题
You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements: A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames
考题
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to place multiple Hyper-V servers in the perimeter network (also known as DMZ). You need to be able to manage the Hyper-V servers by using VMM. Which two actions should you perform for each server in the perimeter network?()A、Create a local administrative accountB、Perform a VMM local agent installationC、Open port 8100 in the Windows firewallD、Copy the security file to the VMM Administrator Console, and then run the Add Hosts Wizard
考题
Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()A、Use the Remote Desktop Connection Broker and failover clusteringB、Use the Remote Desktop Gateway and network load balancingC、Use network load balancing and failover clusteringD、Use DNS round-robin and network load balancing
考题
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()A、Use two iSCSI host bus adaptersB、Use two Fibre Channel host bus adaptersC、Place the physical host servers on the same TCP/IP subnetD、Place the physical host servers on different TCP/IP subnets
考题
Your network environment includes the following elements: Two Windows Server 2008 R2 Hyper-V serversTwo VMware ESX 3.5 serversMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2 You run several Windows Server 2003 virtual machines (VMs) on your ESX host servers. You need to convert the ESX VMs to Hyper-V, and you must minimize the downtime during the conversion. What should you do?()A、Run the New-V2V PowerShell cmdletB、Perform a physical-to-virtual (P2V) conversion while the VMs are runningC、Shut down the VMs, and then perform a virtual-to-virtual (V2V) conversionD、Shut down the VMs, and then perform a physical-to-virtual (P2V) conversion
考题
You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()A、a port numberB、an encryption keyC、the VMM server nameD、the URL of the VMM Self-Service Portal
考题
All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue. What should you do?()A、 Use the nbtstat command-line tool on Client1.B、 Use the pathping command-line tool on Client1.C、 Run the nbtstat -r command on the RRAS server.D、 Run the ping -a Client1 command on the RRAS server.
考题
单选题Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()A
Enable Cluster Shared Volumes (CSVs).B
In Failover Cluster Manager, edit the properties of a single VM.C
In Virtual Network Manager, edit the properties of the virtual network.D
In Hyper-V Manager, take each VM offline and edit the settings of each VM.
考题
单选题You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A
Two network adapters that support 802.1p, and one iSCSI host bus adapterB
Two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyC
Two network adapters that support 802.lq, and one network adapter that supports Jumbo framesD
Three network adapters that support 802. 1p
考题
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A
STPB
GVRPC
SNMPD
VTPE
DHCP
考题
单选题In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?()A
Incorrect subnet maskB
Mismatched MTUC
Switching loopD
VLAN mismatch
考题
多选题Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade. Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network. Which two sets of actions should your plan include?()APause the three VMs, and copy the .vhd files to the test environmentBCreate a checkpoint of the three VMs, and export the checkpoint to the test environmentCImport the checkpoint into the test environment, and apply the application update for testingDCreate three VMs in the test environment, attach the existing .vhd files, and apply the application update for testing
考题
单选题Your web page includes a Java SE v1.5 applet with the following declaration: 11. 13. 14. Which HTTP method is used to retrieve the applet code?()A
GETB
PUTC
POSTD
RETRIEVE
考题
单选题Your network environment includes two Windows Server 2008 R2 Hyper-V servers and one VMware ESX 3.5 host server. You are designing a Microsoft System Center Virtual Machine Manager (SCVMM) 2008 R2 implementation to manage your network environment. SCVMM must be able to perform management tasks that require file transfer operations between your VMware server and your Windows servers. You need to configure the ESX host server to ensure that file transfer operations are encrypted, and follow security best practices. What should you do?()A
Use the default root credentials as the virtual machine delegate, and enable SSH root loginB
Create a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and enable SSH root loginC
Create a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and disable SSH root loginD
Use the default root credentials as the virtual machine delegate, and disable SSH root login
考题
多选题You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 running on the internal network. You have several host servers in a perimeter network (also known as DMZ). You are installing VMM agents on the host servers. You need to ensure that the agents can communicate with the VMM server. Which two elements should you configure?()Aa port numberBan encryption keyCthe VMM server nameDthe URL of the VMM Self-Service Portal
考题
单选题Which one is the most important based on the following common elements of a network design?()A
Business needsB
Risk analysisC
Security policyD
Best practices
考题
多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment
考题
多选题Which three of the following are elements of the Cisco Unified Wireless Network?()AUnified advanced serviceBclient devicesCCatalyst switchesDnetwork managementEmesh access pointsFVPN concentrator
热门标签
最新试卷