100%(2)2 out of 2 people found this document helpful
This preview shows page 1 - 4 out of 18 pages.
Certification Preparation Material Page | 1 Microsoft 70-417 Upgrading Your Skills to MCSA Windows Server 2012Demo Product - For More Information - Visit: Edition = DEMO ProductFull Version Features: 90 Days Free Updates 30 Days Money Back Guarantee Instant Download Once Purchased 24/7 Online Chat Support
Certification Preparation Material Page | 2 Question: 1 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. You plan to create a checkpoint of VM1. You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. What should you do before you create the checkpoint? A. Decrease the Maximum RAM. B. Convert Disk1.vhd to a dynamically expanding disk. C. Run the Stop-VM cmdlet. D. Run the Resize-VHD cmdlet. Answer: C Explanation: For checkpoints created when the virtual machine is stopped The checkpoint contains the state of the hard disks only. For checkpoints created when the virtual machine is running The checkpoint contains the state of the hard disks and the data in memory. Note: A checkpoint saves the state of each virtual hard disk that is attached to a virtual machine and all of the hard disk's contents, including application data files. For virtual machines on Hyper-V and VMware ESX Server hosts, a checkpoint also saves the hardware configuration information. By creating checkpoints for a virtual machine, you can restore the virtual machine to a previous state. Question: 2 Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table. You install a network monitoring application on VM2. You need to ensure that all of the traffic sent to VM3 can be captured on VM2.