Renewal 70-740 Exam Study Guides With New Update Exam Questions

It is more faster and easier to pass the Microsoft 70-740 exam by using Real Microsoft Installation, Storage, and Compute with Windows Server 2016 questuins and answers. Immediate access to the Down to date 70-740 Exam and find the same core area 70-740 questions with professionally verified answers, then PASS your exam with a high score now.

Q1. HOTSPOT

Your network contains an Active Directory forest The forest contains two domain controllers named DC1 and DC2 that run Windows Server 2016. DC1 holds all of the operations master roles.

DC1 experiences a hardware failure

You plan to use an automated process that will create 1000 user accounts You need to ensure that the automated process can complete successfully

Which command should you run? To answer, select the appropriate options in the answer area

 

Answer:

 


Q2. Note This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of Repeated Scenario:

A company named Contoso, ltd. has several servers that run Windows Server 2016 Contoso has a Hyper V environment that uses failover clustering and Windows Server Update Services (WSUS). The environment contains several Windows containers and several virtual machines.

The WSUS deployment contains one upstream server that is located on the company's perimeter network and several downstream servers located on the internal network, A firewall separates the upstream server from the downstream servers.

You plan to deploy a human resources application to a new server named HRServer5. HRServer5 contains a FAT32-formatted data volume.

The CIO of Contoso identifies the following requirements for the company's IT department:

• Deploy failover cluster to two new virtual machines.

• Store all application databases by using Encrypted File System (EFS).

• Ensure that each Windows container has a dedicated IP address assigned by a DHCP server

• Produce a report that lists the processor time used by all of the processes on a server named Server 1 for five hour.

Encrypt all communication between the internal network and the perimeter network, including all WSUS communications.

• Automatically load balance the virtual machines hosted in the Hyper-V cluster when processor utilization exceeds 70 percent.

End of Repeated Scenario.

What should you do to prepare the data volume on HRServer5 to store the databases required for the human resources application?

A. Format the data volume by using ReFS.

B. Enable Trusted Platform Module (TPM) on HRServer5.

C. Format the data volume by using NTFS.

D. Enable BitLocker Drive Encryption (BitLocker) on the data volume.

Answer: C


Q3. Your company has 10 offices. Each office has a local network that contains several Hyper- V hosts that run Windows Server 2016. All of the offices are connected by high speed, low

latency WAN links.

You need to ensure that you can use QoS policies for Live Migration traffic between the offices.

Which component should you install?

A. the Multipath I/O feature

B. the Routing role service

C. the Network Controller server role

D. the Canary Network Diagnostics feature

E. the Data Center Bridging feature

Answer: C,E


Q4. HOTSPOT

You have a server that runs Windows Server 2016. You run the commands shown in the following output PS G:\> Get-DedupVolume | f1

 

 

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

 

Answer:

 


Q5. Note: This question is part of a series of questions that use the same similar answer choices An answer choice may be correct for more than one question in the series Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question

You have a two-node Hyper-V cluster named Cluster1 As virtual machine named VM1 runs on Cluster1

You need to configure monitoring of VM1 The solution must move VM1 to a different node

if the Print Spooler service on VM1 stops unexpectedly Which tool should you use?

A. the clussvc.exe command

B. the cluster.exe command

C. the Computer Management console

D. the configurehyperv.exe command

E. the Disk Management console

F. the Failover Cluster Manager console

G. the Hyper-V Manager console

H. the Server Manager Desktop app

Answer: F


Q6. In this section, you'll see one or more sets of questions with the same scenario and problem Each question presents a unique solution to the problem, and you must determine

whether the solution meets the stated goals Any of the solutions might solve the problem. It is also possible that none of the solutions solve the

problem.

Once you answer a question in this section, you will NOT be able to return to it As a result. these questions will not appear in the review screen

Note This question is part of a series of questions that present the same scenario Each question in the series contains a unique solution Determine whether the solution meets the stated goals.

Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016 All domain controllers run Windows Server 2012 R2

Contoso com has the following configuration

 

You plan to deploy an Active Directory Federation Services (AD FS) farm on Server1 and to configure device registration You need to configure Active Directory to support the planned deployment.

Solution You raise the forest functional level to Windows Server 2012R2. Does this meet the goal?

A. Yes

B. No

Answer: A


Q7. HOTSPOT

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

A company named Contoso, Ltd. has several servers that run Windows Server 2016. Contoso has a Hyper-V environment that uses failover clustering and Windows Server Update Services (WSUS). The environment contains several Windows containers and several virtual machines.

The WSUS deployment contains one upstream server that is located on the company’s perimeter network and several downstream servers located on the internal network. A firewall separates the upstream server from the downstream servers.

You plan to deploy a human resources application to a new server named HRServer5. HRServer5 contains a FAT32-formatted data volume.

The CIO of Contoso identifies the following requirements for the company’s IT department:

- Deploy a failover cluster to two new virtual machines.

- Store all application databases by using Encrypted File System (EFS).

- Ensure that each Windows container has a dedicated IP address assigned by a DHCP server.

- Produce a report that lists the processor time used by all of the processes on a server named Server1 for five hours.

- Encrypt all communication between the internal network and the perimeter network, including all WSUS communications.

- Automatically load balance the virtual machines hosted in the Hyper-V cluster when processor utilization exceeds 70 percent.

You need to create a Data Collector Set to meet the requirement for the processor time report.

What command should you run to create the Data Collector Set? To answer, select the appropriate options in the answer area.

 

Answer:

 


Q8. You need to create highly available storage spaces that connect to directly attached storage on the hosts Which cmdlet should you use?

A. Enable-ClusterStorageSpacesDiret

B. Set-StoragePool

C. Add-ClusterDisk

D. Update-ClusterVirtualMachineConfiguration

Answer: A


Q9. In this section, you'll see one or more sets of questions with the same scenario and problem Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.

On Server1, you have the following zone configuration

 

You need to prevent Server1 from resolving queries from DNS clients located on Subnet4 Server1 must resolve queries from all other DNS clients

Solution From the Security setting of each zone on Server1, you modify the permissions Does this meet the goal?

A. Yes

B. No

Answer: B


Q10. Note This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of Repeated Scenario:

Your network contains an Active Directory domain named contoso.com The functional level of the forest and the domain is Windows Server 2008 R2 All servers in the domain run Windows Server 2016 Standard. The domain contains 300 client computers that run either Windows 8.1 or Windows 10.

The domain contains nine servers that are configured as shown in the following table.

 

The virtual machines are configured as follows:

• E ach virtual machine has one virtual network adapter

• VM1 and VM2 are part of a Network Load Balancing (NIB) cluster.

• All of the servers on the network can communicate with all of the virtual machines.

End of repeated Scenario.

You need to minimize the likelihood that a virtual machine running malicious code will consume excessive resources on Server5.

What should you do?

A. Configure the virtual machines as shielded virtual machines.

B. Run the Set-VMProcessor cmdlet and specify the –EnableHostResourceProtection Parameter.

C. Run the Set-VMProcessor cmdlet and specify the –MaximumCountPerNumaNode Parameter.

D. Configure VM Network Adapter Isolation.

Answer: B