[Free] 2019(Nov) EnsurePass Microsoft 70-740 Dumps with VCE and PDF 121-130

Get Full Version of the Exam
http://www.EnsurePass.com/70-740.html

Question No.121

You have a server named Server1 that runs Windows Server 2016. You need to configure Server1 as a Web Application Proxy.

Which server role or role service should you install on Server1?

  1. Web Server (IIS)

  2. Network Policy and Access Services

  3. Direct Access and VPN (RAS)

  4. Active Directory Federation Services

  5. Remote Access

Correct Answer: E

Question No.122

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Server1 that runs Windows Server 2016.

You plan to use Windows Server Backup to back up all of the data on Server1. You create a new volume on Server1.

You need to ensure that the new volume can be used as a backup target. The backup target must support incremental backups.

Solution: You mount the volume to C:\Backup, and you format the volume by using exFAT. Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.123

You deploy two servers that run Windows Server 2016.

You install the Failovers Clustering feature on both servers. You need to create a workgroup cluster.

What should you do?

  1. Create matching local administrative accounts on both of the servers. Assign the same primary DNS suffix to both of the servers. Run the New-Cluster cmdlet and specify an administrative access point of None.

  2. Configure both of the server to be in a workgroup named Workgroup. Configure the Cluster Service to log on as Network Service. Run the New-Cluster cmdlet and specify an administrative access point of DNS.

  3. Create matching local administrative accounts on both of the servers. Assign the same primary DNS suffix to both of the servers. Run the New-Cluster cmdlet and specify an administrative access point of DNS.

  4. Configure both of the server to be in a workgroup named Workgroup. Configure the Cluster Service to log on as Network Service. Run the New-Cluster cmdlet and specify an administrative access point of None.

Correct Answer: C

Question No.124

You have two servers named Server1 and Server2 that run Windows Server 2016.

You plan to implement Storage Replica to replicate the contents of volumes on Server1 to Server2.

You need to ensure that the replication traffic between the servers is limited to a maximum of 100 Mbps.

Which cmdlet should you run?

  1. Set-NetUDPSetting

  2. New-StorageQosPolicy

  3. Set-SmbBandwidthLimit

  4. Set-NetTCPSetting

Correct Answer: C

Question No.125

You have two Hyper-V hosts named Server1 and Server2 that run Windows Server 2016. Server1 hosts a virtual machine named VM1 that is in a Running state.

On Server1, you export VM1 and then you import VM1 on Server2. What is the current state of VM1 on Server2?

  1. Off

  2. Saved

  3. Running

  4. Paused

Correct Answer: C

Question No.126

You have a server named Server1.

You enable BitLocker Drive Encryption (BitLocker) on Server1.

You need to change the password for the Trusted Platform Module (TPM) chip. What should you run on Server1?

  1. Initialize-Tpm

  2. Import-TpmOwnerAuth

  3. repair-bde.exe

  4. bdehdcfg-exe

Correct Answer: B

Question No.127

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

A company named Contoso, Ltd. has several servers that run Windows Server 2016. Contoso has a Hyper-V environment that uses failover clustering and Windows Server Update Services (WSUS). The environment contains several Windows containers and several virtual machines.

The WSUS deployment contains one upstream server that is located on the company#39;s perimeter network and several downstream servers located on the internal network. A firewall separates the upstream server from the downstream servers.

You plan to deploy a human resources application to a new server named HRServer5. HRServer5 contains a FAT32-formatted data volume.

The CIO of Contoso identifies the following requirements for the company#39;s IT department:

image

Deploy failover cluster to two new virtual machines.

image

Store all application databases by using Encrypted File System (EFS).

image

image

Ensure that each Windows container has a dedicated IP address assigned by a DHCP server Produce a report that lists the processor time used by all of the processes on a server named

Server1 for five hour.

Encrypt all communication between the internal network and the perimeter network, including all WSUS communications.

Automatically load balance the virtual machines hosted in the Hyper-V cluster when processor utilization exceeds 70 percent.

Which two actions should you perform to meet the encryption requirement for WSUS? Each correct answer presents part of the solution.

  1. Create a firewall rule to allow TCP port 8531.

  2. Require SSL on the ClientWebService virtual directory.

  3. Create a firewall rule to allow TCP port 443.

  4. Require SSL on the Inventory virtual directory.

Correct Answer: BC

Question No.128

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. Server2 and Server3 have the DHCP Server role installed and have several DHCP scopes configured. The IPAM server retrieves data from Server2 and Server3.

A domain user named User1 is a member of the groups shown in the following table.

image

On Server1, you create a security policy for User1. The policy grants the IPAM DHCP Scope Administrator Role with the \Global access scope to the user.

Which actions can User1 perform?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.129

You need to implement network virtualization. On which object should you configure the virtual subnet ID?

  1. Virtual switch

  2. Hyper-V server

  3. VM

  4. Virtual network adapter

Correct Answer: A

Question No.130

You have a server named Server1 that runs Windows Server 2016.

The server has an application named App1. App1 writes entries to the Application event log when errors are encountered. The events have IDs of either 111 or 112.

You need to restart the service whenever either of these events is logged. What should you do?

  1. From Windows PowerShell, run the Write-EventLog cmdlet and specify the-EventID parameter and the -Source parameter.

  2. From Event Viewer, create a custom view that has a filter for the event IDs.

  3. From Event Viewer, create a subscription that has a filter for the event IDs.

  4. From Task Scheduler, use Create Task to create one task that includes triggers for both event IDs.

  5. From Windows PowerShell, run the Get-SMServerEvent cmdlet and pipe the output to the Start- NetEventSession cmdlet.

  6. From Performance Monitor, add an Event Trace Session data collector that uses the Microsoft- Windows-Eventlog provider.

Correct Answer: D

Get Full Version of the Exam
70-740 Dumps
70-740 VCE and PDF

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.