Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

PART :1

1. What happens if you attempt to add workgroup servers to Server Manager?

a. Server Manager allows only servers that are members of an Active Directory Domain Services (AD DS) domain to be managed.

b. Server Manager adds and allows management of any computer, whether a member of an AD DS domain or workgroup.

c. Server Manager will not permit workgroup servers to be added and managed.

d. Server Manager usually allows you to add workgroup servers, but attempts to access the remote server fail with a "Credentials not valid" error.

2. Once a server is added to Server Manager, what actions are taken to permit remote server management?

a. No further action is needed. For example, you may immediately use the Add Roles and Features Wizard.

b. No further action is needed, because Windows Remote Management (WinRM) is enabled on the source Windows Server 2012.

c. No further action is needed because WS-Management Protocol is already running.

d. No further action is needed thanks to Windows Management Instrumentation (WMI) and Windows PowerShell.

3. What is the primary difference between the Windows Server 2012 Server Manager and previous versions?

a. Windows Server 2012 Server Manager allows management of multiple remote servers at once.

b. Windows Server 2012 Server Manager allows management of remote servers, categorized in role groups.

c. Windows Server 2012 Server Manager allows remote management of other servers, including down-level Windows servers.

d. Windows Server 2012 Server Manager has been tested with nearly 100 servers added to the interface.

4. What functional benefit is derived from creating server groups?

a. Server groups allow administrators to add roles to several servers at once.

b. Server groups allow administrators to navigate and organize several servers at once.

c. Server groups allow administrators to navigate several servers at once.

d. Server groups allow administrators to organize several servers at once.

5. The security configuration of the Windows PowerShell Web Access Gateway server iscrucial, employing a security certificate from a trusted certification authority and userspecific

authorization rules. Why are these security measures so crucial?

a. There is often both client and server side security, but only server end measures are controlled.

b. There is no mandatory security on the client side of the application, relying more on server side security.

c. There is no security on the client side of the application, instead relying on robust server side security.

d. There is often both client and server side security, but only client end measures are controlled.

PART :2

1. Hyper-V in Windows Server 2012 is a Type I virtualization architecture. What isthe fundamental difference between Hyper-V and older, Type II virtualization  architectures?

a. Hyper-V creates environments called partitions, each with its own operating system installed.

b. Its hypervisor designates the first partition as the parent partition and all subsequent partitions as child partitions.

c. Its hypervisor is an abstraction layer and interacts directly with computer hardware, rather than as a host OS application.

d. Computer subsystems such as Plug and Play and power management are managed by Hyper-V's parent partition.

2. Windows Server 2012 includes Hyper-V in which edition(s)?

a. All editions

b. The Datacenter edition

c. The Standard and Datacenter editions

d. The Essentials, Standard, and Datacenter editions

3. After installing the Hyper-V role, what is the startup procedure for Windows Server

2012?

a. The newly installed hypervisor starts first, and then loads the operating system as the primary or parent partition.

b. The actual startup procedure is not altered.

c. The newly installed hypervisor starts first, and then loads the operating system as a child partition.

d. The newly installed hypervisor starts second, after the operating system loads as a partition.

4. What is the primary purpose of the software package offered by Hyper-V called guestintegration services?

a. Guest integration services improves communications between the parent partition and child partitions.

b. Guest integration services resolves compatibility issues of certain guest operating systems experiencing non-functioning features.

c. Guest integration services improves data exchange between the parent partition and child partitions.

d. Guest integration services improves time synchronization between the parent partition and child partitions.

5. What is Resource Monitoring in Windows Server 2012?

a. Resource Monitoring is a PowerShell-based feature that enables you to document virtual machine usage.

b. Resource Monitoring is a Server Manager feature that enables you to monitor virtual machine resources.

c. Resource Monitoring is a PowerShell-based feature that enables you to redistribute virtual machine resources.

d. Resource Monitoring is a Server Manager feature that enables you to document virtual machine communications.

PART :3

1. Deciding between two virtual disk formats (VHD and VHDX), you need one to accommodateimage sizes up to 2 TB (terabytes) and be compatible with both Windows Server  2012's Hyper-V and Microsoft's older product, Virtual PC. Which format do you choose

and why?

a. VHD, because it supports up to 2 TB image files.

b. VHDX, because it supports file sizes far beyond 2 TB-up to 64 TB.

c. VHD, because it supports both new and old hypervisor products.

d. VHDX, because it supports larger block sizes for tuning storage performance.

2. You need to connect a virtual hard disk with a virtual machine (VM). What disk formatdo you choose and why?

a. VHDX, because it's the only one available when creating a new disk.

b. VHD or VHDX if using an existing virtual hard disk.

c. VHD with an existing hard disk and a Type II hypervisor product.

d. Either one is possible and applicable.

3. You intend to create a new virtual hard disk, specifying a 700 GB VHDX image file witha logical sector size of 4 KB. How do you proceed?

a. With Server Manager, using Hyper-V Manager's New Disk feature.

b. With the utilities included in Hyper-V's guest integration services.

c. Those exact specifications are not possible in Hyper-V Manager.

d. With PowerShell, using the New-VHD cmdlet with appropriate parameters.

4. Is it possible for a VM to access a hard disk directly?

a. No. VMs access virtual hard disks, areas of space on the physical hard disk.

b. Yes. VMs can have "pass-through disks," a special virtual disk that directly accesses

the physical disk if made exclusively available to the VM.

c. No. VMs can never access physical hardware, but only through the hypervisor.

d. Yes. VMs use virtual hard disks, which are essentially the physical hard disks.

5. What is a key benefit of using differencing disks?

a. They enable you to use baseline images.

b. They enable you to keep a fixed image in its original state.

c. They allow you to experiment without repercussions.

d. They let you create parent and child-differencing disks.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91383914
  • Price:- $65

Guranteed 36 Hours Delivery, In Price:- $65

Have any Question?


Related Questions in Management Information System

Case 3 focuses on capturing system requirements an

Case 3 focuses on capturing system requirements, an important component of any model of the software development process. It is important to remember that the purpose of requirements is to specify the problem that the sy ...

Designing team and team identitypart 1 think about how to

Designing Team and Team Identity Part 1: Think about how to build teams in terms of designing the task, selecting the people, and then, managing their relationships. How would compose a team for completing a course/work ...

1 during this course you will design a program for a state

1. During this course you will design a program for a state university. The university wants to encourage students to take advantage of co-curricular offerings like athletic events, concerts, plays and guest speakers. Th ...

Explain the need for designing procedures for simple tasks

Explain the need for designing procedures for simple tasks such as creating or modifying access controls. Create a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can fo ...

You are hired as a chief technology officer cto of a

You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the product. As CTO, ...

Word document of 8-10 total pages including empty

Word document of 8-10 total pages, including empty sections Target Organization is Canopy Lawn Care Use MS Word Title page Course number and name Project name Student name Date Table of contents Use autogenerated TOC Sep ...

Solutions for e-banking security holesdigital security of

Solutions for E-Banking Security Holes: Digital Security of software systems in Banks is very important to protect sensitive bank information, employee's identity and customer's privacy, also to avoid many legal problems ...

A register is the fastest data storage element within a

A register is the fastest data storage element within a processor. A 32-bit register consists of a set of flip-flops to store 32 bits of information. Design a 4-bit register by using flip-flops and answer the following q ...

Discussionnbsp 300 words with 2 referencesyou have been

Discussion  : 300 Words with 2 references You have been working for four years in a bank branch located in the front section of a large grocery store. For the last two years, the branch has been underperforming and a poo ...

Assignmentafter you have analysed your collected

Assignment After you have analysed your collected information, produce the following UML diagrams for proposed system as the specifications for a new automated information system for ASC. 1. Identify classes that should ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As