your ads here

advertisement

Home » Privacy Policy
Networking with Windows Server 2016 Vendor: Microsoft Exam Code: 70-741 Exam Name: Networking with Windows Server 2016 Q&As: 125(There are 2 parts in the dump, 125 questions in total. )QUESTION 1 Your company has 10 offices. Each office has a local network that contains several Hyper- V hosts that run Windows Server 2016. All of the offices are connected by high speed, low latency WAN links. You need to ensure that you can use QoS HPE0-J76 dumps policies for Live Migration traffic between the offices. Which component should you install? A. the Data Center Bridging feature B. the Routing role service C. the Network Controller server role D. the Multipath I/O feature E. the Canary Network Diagnostics feature Correct Answer: D QUESTION 2 A company named Contoso, Ltd has five Hyper-V hosts that are configured as shown in the following table. What are two valid live migration scenarios for virtual machines in your environment? A. from Sever1 to server5 B. from Server4 to Server 5 C. from Server2 to Server3 D. from Server3 to Server4 Correct Answer: AC QUESTION 3 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Your network contains an Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2012. The network uses an address space of 192.168.0.0/16 and contains multiple subnets. The network is not connected to the Internet. The domain contains three servers configured as shown in the following table. Client computers obtain TCP/IP settings from Server3. You add a second network adapter to Server2. You connect the new network adapter to the Internet. You install the Routing role service on Server2. Server1 has four DNS zones configured as shown in the following table. You need to ensure that when a record is added dynamically to fabrikam.com, only the computer that created the record can modify the record. The solution must allow administrators to modify all of the records in fabrikam.com. What should you do? A. Change fabrikam.com to an Active Directory-integrated zone. B. Raise the functional level of the domain. C. Modify the security settings of the Fabrikam.com.dns file. D. Modify the Start of Authority (SOA) settings of fabrikam.com Correct Answer: A QUESTION 4 You have a Hyper-V server named Server1 that runs Windows Server 2016. Server1 has an IP address of 192.168.1.78. Server1 IIA-CIA-PART2 dumps has a container named Container1 that hosts a web application on port 84. Container1 has an IP address of 172.16.5.6. Container1 has a port mapping from port 80 on Server1 to port 84 on Container1. You have a server named Server2 that has an IP address of 192.168.1.79, You need to connect to the web application from Server2. To which IP address and port should you connect? A. 172.16.5.6:80 B. 192.168.1.78:80 C. 172.16.5.6:84 D. 192.168.1.78:84 Correct Answer: A QUESTION 5 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server2 than runs Windows Server 2016. Users report that their client computers fail to obtain an IP address. You open the DHCP console as shown in the Exhibit. (Click the Exhibit button.)Scope1 has an address range of 172.16.0.10 to 172.16.0.100 and a prefix length of 23 bits. You need to ensure that all of the client computers on the network can obtain an IP address from Server2. Solution: You run the Set-DhcpServerv4Scope cmdlet. Does this meet the goal? A. Yes B. No Correct Answer: A QUESTION 6 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets jn0-643 dumps might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2016 and has the DNS Server role installed. Automatic scavenging of state records is enabled and the scavenging period is set to 10 days. All client computers dynamically register their names in the contoso.com DNS zone on Server1. You discover that the names of multiple client computers that were removed from the network several weeks ago can still be resolved. You need to configure Server1 to automatically remove the records of the client computers that have been offline for more than 10 days. Solution: You modify the Zone Aging/Scavenging properties of the zone. Does this meet the goal? A. Yes B. No Correct Answer: A QUESTION 7 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Your network contains an Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2012. The network uses an address space of 192.168.0.0/16 and contains multiple subnets. The network is not connected to the Internet. The domain contains three servers configured as shown in the following table. Client computers obtain TCP/IP settings from Server3. You add a second network adapter to Server2. You connect the new network adapter to the Internet. You install the Routing role service on Server2. Server1 has four DNS zones configured as shown in the following table. You need to create a zone to ensure that Server1 can resolve single-label names. What should you name the zone on Server1? A. . (root) B. WINS C. NetBIOS D. GlobalNames Correct Answer: D QUESTION 8 You have 2000 devices, One hundred of the devices are mobile devices that have physical addresses beginning with 98-5F. You have a DHCP server named Server1. You need to ensure that the mobile devices register their host name by using a DNS suffix of mobile.contoso.com A. From the properties of Scopte1, Modify the Conflict detection attempts setting. B. From the properties of Scope1, Configure Name Protection. C. From the Properties of IPV4, configure the bindings. D. From IPV4, create a new filter. E. From the properties of Scope1, create an exclusion range. F. From IPv4, run the DHCP Policy Configuration Wizard. G. From Control Panel, modify the properties of Ethernet. H. From Scope1, create a reservation Correct Answer: F QUESTION 9 Your company has 5,000 users who work remotely. You have 40 VPN servers that host the remote connections for the users. You plan to deploy a RADIUS solution that contains five RADIUS servers. You need to ensure that client authentication requests are distributed evenly between the five RADIUS servers. What should you do? A. Install the Network Load Balancing role service on all of the RADIUS server. Configure all of the RADIUS clients to connect to a virtual IP address.B. Deploy RAS Gateway to a new server. Configure all of the RADIUS clients to connect to RAS Gateway. C. Install the Failover Clustering role service on all of the RADIUS servers. Configure all of the RADIUS clients to lx0-103 dumps connect to the IP address of the cluster. D. Deploy a RADIUS proxy to a new server. Configure all of the RADIUS clients to connect to the RADIUS proxy. Correct Answer: D QUESTION 10 You company has a main office in London. The company has 1,000 users who are located in many countries. You plan to deploy a large remote access solution for the company. The London office has three servers named Server1, Server2, and Server3 that run Windows Server 2016. You plan to use Server1 as a VPN server, Server2 as a RADIUS proxy, and Server3 as a RADIUS server. You need to configure Server2 to support the planned deployment. Which three actions should you perform on Server2? Each correct answer presents part of the solution. A. Create a connection request policy. B. Deploy a Windows container. C. Add a RADIUS client. D. Create a network policy. E. Create a remote RADIUS server group. Correct Answer: ACE QUESTION 11 You have an Active Directory domain named Contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2016. You install the Remote Access server role on Server1. You install the Network Policy and Access Services server role on Server2. You need to configure Server1 to use Server2 as a RADIUS server. What should you do? A. From the Connection Manager Administration Kit, create a Connection Manager profile. B. From Routing and Remote Access, configure the authentication provider. C. From Active Directory Users and Computers, modify the Delegation settings of the Server1 computer account. D. From Server Manager, create an Access Policy. Correct Answer: D QUESTION 12 Scenario: You are a network administrator for a company named Contoso,Ltd. The network is configured as shown in the exhibit. You install the Remote Access server role on Server2. Server2 has the following configured. *Network address translation (NAT) *The DHCP Server server role The Security Policy of Contoso states that only TCP ports 80 and 443 are allowed from the internet to server2 You identify the following requirements: * Add 28 devices to subnet2 for a temporary project. * Configure Server2 to accept VPN connections from the internet. * Ensure that devices on Subnet2 obtain TCP/IP settings from DHCP on Server2. End of Scenario: You add a computer to subnet1. The computer has an IP address of 10.10.0.129 Web1 receives a request from the new computer m70-101 dumps and sends a response. What should you do? A. 10.10.0.129 B. 10.10.0.224 C. 131.107.0.223 D. 172.16.128.222 Correct Answer: A QUESTION 13 You have a test environment that includes two servers named Server1 and Server2. The severs run Windows Server 2016. You need to ensure that you can implement SMB Direct between the servers. Which feature should the servers support? A. Remote Direct Memory Access (RDMA) B. Multipath I/O (MPIO) C. virtual machine queue (VMQ) D. single root I/O virtualization (SR-IOV) Correct Answer: A QUESTION 14 You have a Scale-Out File Server that has a share named Share1. Share1 contains a virtual disk file named Disk1.vhd. You plan to create a guest failover cluster. You need to ensure that you can use the virtual disk as a shared virtual disk for the gust failover cluster. Which cmdlet should you use?A. Optimize VHD B. Optimize VHDSet C. Convert-VHD D. Set-VHD Correct Answer: A QUESTION 15 You have a server named Server1 that runs Windows Server 2016. Server1 is located on the perimeter network, and only inbound TCP port 443 is allowed to connect Server1 from the Internet. You install the Remote Access server role on Server1. You need to configure Server1 to accept MA0-101 exam VPN connections over port 443. Which VPN protocol should you use? A. PPTP B. SSTP C. L2TP D. IKEv2 Correct Answer: B QUESTION 16 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solutions, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory forest named contoso.com. The forest has three sites located in London, Paris and Berlin. The London site contains a web server named Web1 that runs Windows Server 2016. You need to configure Web1 as an HTTP content server for the hosted cache servers located in the Paris and Berlin sites. Solution: You install the BranchCache feature, and then you start the BranchCache service. Does this meet the goal? A. Yes B. No Correct Answer: B QUESTION 17 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10. On Server1, you have the following zone configuration. You have the following subnets defined on Server1. You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients. Solution: From the Security Setting of each zone on Server1, you modify the permissions. Does this meet the goal? A. Yes B. No Correct Answer: B QUESTION 18 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2016 and has the DNS Server role installed. Automatic scavenging of state records is enabled and the scavenging period is set to 10 days. All client computers dynamically register their names in the contoso.com DNS zone on Server1. You discover that the names of multiple client computers that were removed from the network several weeks ago can still be resolved. You need to configure Server1 to automatically remove the records of the client computers that have been offline for more than 10 days. Solution: You set the Expires after value of the zone. Does this meet the goal? A. Yes B. No Correct Answer: B QUESTION 19 Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question. Your network contains Windows and non-Windows devices. You have a DHCP server named Server1 that has an IPv4 scope named Scope1. You need to prevent a client computer that uses the same name as an existing registration from updating the mb2-707 dumps registration. What should you do? A. From the properties of Scope1, modify the Conflict detection attempts setting. B. From the properties of Scope1, configure Name Protection. C. From the properties of IPv4, configure the bindings. D. From IPv4, create a new filter. E. From the properties of Scope1, create an exclusion range. F. From IPv4 run the DHCP Policy Configuration Wizard. G. From Control Panel, modify the properties of Ethernet. H. From Scope1, create a reservation. Correct Answer: F QUESTION 20 You have a server named Server1 that runs Windows Server 2016.Server1 has two network cards. One network card connects to your internal network and the other network card connects to the Internet. You plan to use Server1 to provide Internet connectivity for client computers on the internal network. You need to configure Server1 as a network address translation (NAT) server. Which server role or role service should you install on Server1 first? A. Network Controller B. Web Application Proxy C. Routing D. DirectAccess and VPN (RAS) Correct Answer: C QUESTION 21 You have an Active Directory forest that contains 30 servers and 6,000 Client computers. You deploy a new DHCP server that runs Windows Server 2016. You need to retrieve the list of the authorized DHCP servers. Which command should you run? A. Get-DHCPServerDatabase B. Netstat -p IP -s -a C. Get-DHCPServerInDc D. Show-ADAuthenticationPolicyExpression -AllowedToAuthenticateTo Correct Answer: C QUESTION 22 Your company owns the public Internet IP address range of 131.107.20.0 to 131.107.20.255. You need to create a subnet that supports four hosts. The solution must minimize the number of addresses available to the subnet. Which subnet should you use? A. 131.107.20.16/28 B. 131.107.20.16/30 C. 131.107.20.0/29 D. 131.107.20.0 with subnet mask 255.255.255.224 Correct Answer: C QUESTION 23 You have an application named App1. App1 is distributed to multiple Hyper-V virtual machines in a multitenant environment. You need to ensure that the traffic is distributed evenly among the virtual machines that host App1. What should you include in the environment? A. Network Controller and Windows Server Network Load Balancing (NLB) nodes B. an RAS Gateway and Windows Server Software Load Balancing (SLB) nodes C. an RAS Gateway and Windows Server Network Load Balancing (NLB) nodes D. Network Controller and Windows Server Software Load Balancing (SLB) nodes Correct Answer: B QUESTION 24 Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question. You have a DHCP server named Server1 that has three network cards. Each network card is configured to use a static IP address. You need to prevent all client computers that have physical address beginning with 98-5F from leasing an IP address from Server1. What should you do? A. From the properties of Scope1, modify the Conflict detection attempts setting. B. From the properties of Scope1, configure Name Protection. C. From the properties of IPv4, configure the bindings. D. From IPv4, create a new filter. E. From the properties of Scope1, create an exclusion range. F. From IPv4, run the DHCP Policy Configuration Wizard. G. From Control Panel, modify the properties of Ethernet. H. From Scope1, create a reservation. Correct Answer: E QUESTION 25 You have a server named Server1 that runs Windows Server 2016 and is configured as a domain controller. You install the DNS Server server role on Server1. You plan to store a DNS zone in a custom Active Directory partition. You need to create a new Active Directory partition for the zone. What should you use? A. Set-DnsServer B. Active Directory Sites and Services C. Dns.exe D. Dnscmd.exe Correct Answer: D QUESTION 26 Note: This question is part of a series of mb2-708 dumps questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain named contoso.com You need to create a Nano Server image named Nano1 that will be used as a virtualization host. The windows server 2016 source files are located in drive D. Solution: You run the following cmdlet. New-NanoServerImage dition Datacenter eploymentType Host ackage Microsoft- NanoServer-Compute-Package ediaPath `D:\' argetPath C:\Nano1\Nano1.wim omputerName Nano1 omainName Contoso.com Does this meet the goal? A. Yes B. NO Correct Answer: A QUESTION 27 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Hyper-V host named Server1 that hosts a virtual machine named VM1. Server1 and VM1 run Windows Server 2016. The settings for VM1 are configured as shown in the exhibit below.You need to ensure that you can use the Copy-VMFile cmdlet on Server1 to copy files from VM1. Solution: You start the Hyper-V Guest Service Interface service on VM1. Does this meet the goal? A. YES B. NO Correct Answer: A QUESTION 28 You have a server named Server1 that runs Windows Server 2016. Server1 has the DHCP Server and the Windows Deployment Service server roles installed. Server1 is located on the same subnet as client computers. You need to ensure that clients can perform a PXE boot from Server1. Which two IPv4 options should you configure in DHCP? Each correct answer presents part of the solution. A. 003 Router B. 066 Boot Server Host Name C. 015 DNS Domain Name D. 006 DNS Servers E. 060 Option 60 Correct Answer: BE QUESTION 29 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Refer to exhibit: Server1 has two virtual machines named VM1 and VM that run Windows Server 2016. VM1 connects to Private VM2 has two network adapters. You need to ensure that VM1 connects to the corporate network by using NAT. Solution: You connect VM1 to Internal1. You run the New-NetNatIpAddress and the New- NetNat cmdlets on Server1. You configure VM1 to use VM2 as the default gateway. Does this meet the goal? A. Yes B. No Correct Answer: A QUESTION 30 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain named contoso.com You need to create a Nano Server image named mb5-705 dumps Nano1 that will be used as a virtualization host. The windows server 2016 source files are located in drive D. Solution: You run the following cmdlet. New-NanoServerImage dition Datacenter eploymentType Host ackage Mictosoft- NanoServer-SCVMM-Package ediaPath `D:\ -TargetPath C:\nano1\Nano1.wim omputerName Nano1 omaintiame Contoso.com Does this meet the goal? A. Yes B. NO Correct Answer: A

Privacy Policy

What This Privacy Policy Covers

This policy covers how the Organic Wine Company (OWC) treats personal information that OWC collects and receives, including information related to your past use of OWC products and services, your use of www.theorganicwinecompany.com and/or any OWC web sites. Personal information is information about you that is personally identifiable like your name, address, email address, or phone number, and that is not otherwise publicly available.

Clients

  • OWC services and products are developed for the use of, and distributed to, third party clients. OWC encourages its clients to adopt privacy policies similar to its own. OWC sells its services and products only to reputable and ethical clients. OWC cannot be held responsible if a client chooses unethical or immoral use of the information that the OWC products gather.
  • This policy does not apply to the practices of companies that OWC does not own or control, or to people that OWC does not employ or manage.

Information Collection and Use

  • When you register for a OWC event, we ask that you provide basic contact information such as your name, address, and email address. In addition, other questions specifically for an event might be asked and recorded so as to better equip the event hosts for customizing their event. This information is provided to the specific sponsor for the event you registered for. On the OWC website, viewers are only asked to provide the above information in the event they wish to view an archived webinar. This information is provided to the specific sponsor for the archived event you view.
  • OWC may combine information about you that we have with information we obtain from business partners or other companies.
  • OWC automatically receives and records information on our server logs from your browser, including your IP address and the page you request.
  • OWC uses information for the following general purposes: to fulfill your requests for products and services, improve our services, contact you, conduct research, and provide anonymous reporting for internal and external clients. Additionally, as stated above, When you register for a OWC event, your contact information is provided to the specific sponsor for the event.

Information Collected Automatically

We receive and store certain types of information whenever you interact with us via OWC.

  • We may contract with third party marketing companies to serve advertisements on our behalf across the Internet. They may collect non-personal information about your visits to our website, and your interaction with our products and services. They may also use non-personal information about your visits to this and other websites to target advertisements for goods and services. These targeted advertisements may appear on other websites that you visit. The anonymous information is collected through the use of technology such as Cookies and Web Beacons, which are industry standard. No Personally Identifiable Information (“PII”) is collected in this process.
  • Computer configuration: We automatically receive and log information from your browser, including your IP address, your operating system, browser type and version, CPU speed, and connection speed.
  • Email delivery and open rates: To help us make our emails more useful and interesting, and to ensure that we are delivering the services you have ordered, we often receive a confirmation when you receive and/or open email from OWC.

Information from Other Sources

We may receive information about you from other sources, add it to our account information and treat it in accordance with this policy.

  • Customer and order data from our partners: If you registered directly with a business partner for which we provide fulfillment or other services, your account information and order information is passed to us.
  • Updated delivery and address information: We may obtain updated contact information from third parties in order to correct our records and fulfill your orders or deliver communications to you.
  • Demographic and purchase information: We may reference other sources of demographic and purchase information in order to provide you with more targeted communications and promotions.

Information Sharing and Disclosure

We may share your PII and non-personal information, including your name, address, email address and any transactions you conduct on our website or offline with us with a third party advertising partner and its service providers in order to deliver tailored advertising to you that match your interests when you visit our website as well as other websites. Our advertising partner will make the data that we provide anonymous so that no one else will receive your PII.

Email Communications to our Users

OWC sends email communications solely in connection with our providing OWC services to clients. The following outlines the types of email OWC sends to our users, and the choices you have about which messages to receive:

  • Messages required to service event registrations: OWC will send you email notifying you of your event details. We may also send you communications related to your upcoming event, for example reminding you of the details, or when those details change.
  • Marketing messages about OWC: We may send you marketing messages related to our services you receive, for example, encouraging you to register for more Webinars or extend your Web event presence.

Information Protection

OWC uses industry-standard protocols to safeguard confidentiality of information.

Cookies

Cookies are alphanumeric identifiers that a Web site can store on your computer’s hard drive. When you visit www.theorganicwinecompany.com, create a user account, or otherwise interact with a OWC event online, we may set cookies on your personal computer. OWC’s website does not require you to enable cookies in order to browse its site.

Confidentiality and Security

  • Internally, we limit access to your personal information to OWC associates who will use the data to troubleshoot, support your use of the service, and improve the service.
  • We have physical, electronic, and procedural safeguards that comply with federal regulations to protect personal information about you.

‘No Spyware’ Policy

www.theorganicwinecompany.com does not contain Spyware. Spyware is software that is installed deceptively to gather information about you without your knowledge. This can include centrally recording your personal Internet usage, monitoring your keyboard strokes or capturing personal information. If you think that you downloaded and/or installed spyware, we suggest reporting it on the alt.privacy.spyware newsgroup available on Google Groups.

Opt-Out

You may opt-out of the use of your information for tailored advertising purposes.  To learn more about the use of this information or to choose not to have this information used by our third-party advertising partner by opting out, please visit the Network Advertising Initiative by clicking here. If you delete your Cookies, use a different browser, or buy a new computer, you will need to renew your opt-out choice.

To opt out of all OWC email and phone communications, please contact us directly.

Changes to this Privacy Policy

OWC may update this policy by placing a prominent notice on our site.

Questions and Suggestions

If you have questions or suggestions, please let us know via the email form on our contact page.